Sciweavers

19174 search results - page 3558 / 3835
» Computer Animation Techniques
Sort
View
139
Voted
DSN
2005
IEEE
15 years 10 months ago
The Effects of Algorithmic Diversity on Anomaly Detector Performance
Common practice in anomaly-based intrusion detection assumes that one size fits all: a single anomaly detector should detect all anomalies. Compensation for any performance short...
Kymie M. C. Tan, Roy A. Maxion
GLVLSI
2005
IEEE
124views VLSI» more  GLVLSI 2005»
15 years 10 months ago
SOFTENIT: a methodology for boosting the software content of system-on-chip designs
Embedded software is a preferred choice for implementing system functionality in modern System-on-Chip (SoC) designs, due to the high flexibility, and lower engineering costs pro...
Abhishek Mitra, Marcello Lajolo, Kanishka Lahiri
152
Voted
ICDCS
2005
IEEE
15 years 10 months ago
ReDAL: Request Distribution for the Application Layer
Modern application infrastructures are based on clustered, multi-tiered architectures, where request distribution occurs in two sequential stages: over a cluster of web servers, a...
Debra E. VanderMeer, Helen M. Thomas, Kaushik Dutt...
159
Voted
ICRA
2005
IEEE
130views Robotics» more  ICRA 2005»
15 years 10 months ago
Effective Constrained Dynamic Simulation Using Implicit Constraint Enforcement
- Stable and effective enforcement of hard constraints is one of the crucial components in controlling physics-based dynamic simulation systems. The conventional explicit Baumgarte...
Min Hong, Min-Hyung Choi, Sunhwa Jung, Samuel W. J...
148
Voted
IPPS
2005
IEEE
15 years 10 months ago
Scheduling Processor Voltage and Frequency in Server and Cluster Systems
Modern server farm and cluster sites consume large quantities of energy both to power and cool the machines in the site. At the same time, less power supply redundancy is offered ...
Ramakrishna Kotla, Soraya Ghiasi, Tom W. Keller, F...
« Prev « First page 3558 / 3835 Last » Next »