Sciweavers

1187 search results - page 127 / 238
» Computation in Extended Argumentation Frameworks
Sort
View
NDSS
2000
IEEE
15 years 6 months ago
Building Adaptive and Agile Applications Using Intrusion Detection and Response
Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...
CA
1999
IEEE
15 years 6 months ago
Group Interaction in a Surround Screen Environment
This paper describes a setup using a surround screen environment (Extended Virtual Environment EVE dome) that we used to explore group interaction in real and virtual space. We ha...
Michael Hoch, Daniel Schwabe
STACS
1999
Springer
15 years 5 months ago
On Quantum Algorithms for Noncommutative Hidden Subgroups
Quantum algorithms for factoring and finding discrete logarithms have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the ...
Mark Ettinger, Peter Høyer
CCGRID
2006
IEEE
15 years 5 months ago
Design of High Performance MVAPICH2: MPI2 over InfiniBand
MPICH2 provides a layered architecture for implementing MPI-2. In this paper, we provide a new design for implementing MPI-2 over InfiniBand by extending the MPICH2 ADI3 layer. Ou...
Wei Huang, Gopalakrishnan Santhanaraman, Hyun-Wook...
FTDCS
2004
IEEE
15 years 5 months ago
GT-P2PRMI: Improving Middleware Performance Using Peer-to-Peer Service Replication
Peer-to-peer systems have the desirable property that the amount of resources available in the system increase as demand for services increases due to growth of the system. We exp...
Tianying Chang, Mustaque Ahamad