Sciweavers

4172 search results - page 781 / 835
» Computing Machinery and Understanding
Sort
View
IISWC
2006
IEEE
15 years 3 months ago
Comparing Benchmarks Using Key Microarchitecture-Independent Characteristics
— Understanding the behavior of emerging workloads is important for designing next generation microprocessors. For addressing this issue, computer architects and performance anal...
Kenneth Hoste, Lieven Eeckhout
IROS
2006
IEEE
116views Robotics» more  IROS 2006»
15 years 3 months ago
On the Importance of Asymmetries in Grasp Quality Metrics for Tendon Driven Hands
Abstract— Grasp quality measures are important for understanding how to plan for and maintain appropriate and secure grasps for pick and place operations and tool use. Most grasp...
Jiaxin L. Fu, Nancy S. Pollard
P2P
2006
IEEE
153views Communications» more  P2P 2006»
15 years 3 months ago
Internet-Scale Storage Systems under Churn -- A Study of the Steady-State using Markov Models
Content storage in a distributed collaborative environment uses redundancy for better resilience and thus provides good availability and durability. In a peer-to-peer environment,...
Anwitaman Datta, Karl Aberer
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 3 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
TRIDENTCOM
2006
IEEE
15 years 3 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff