Sciweavers

267 search results - page 16 / 54
» Credal Networks for Operational Risk Measurement and Managem...
Sort
View
SOSP
2003
ACM
15 years 8 months ago
Xen and the art of virtualization
Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity ...
Paul Barham, Boris Dragovic, Keir Fraser, Steven H...
ICNSC
2007
IEEE
15 years 6 months ago
Dynamic Analysis and Traversability Prediction of Tracked Vehicles on Soft Terrain
– Unmanned ground vehicles are widely used in industries where repetitive tasks or high risk missions are required. Such vehicles usually operate on soft deformable terrains and ...
Said Al-Milli, Kaspar Althoefer, Lakmal D. Senevir...
NOMS
2008
IEEE
15 years 6 months ago
PathCrawler: Automatic harvesting web infra-structure
Abstract—As network topologies have grown in size and complexity, it is becoming a daunting task for network administrators to keep track the capacity dimensioning of newly insta...
Cesar Marcondes, M. Y. Sanadidi, Mario Gerla, Ramo...
103
Voted
ISLPED
2010
ACM
153views Hardware» more  ISLPED 2010»
14 years 12 months ago
Leakage minimization using self sensing and thermal management
We have developed a system architecture, measuring and modeling techniques, and algorithms for on-line power and energy optimization and thermal management. The starting point for...
Alireza Vahdatpour, Miodrag Potkonjak
96
Voted
CACM
2004
212views more  CACM 2004»
14 years 11 months ago
The Spinning Cube of Potential Doom
Darknets are often proposed to monitor for anomalous, externally sourced traffic, and require large, contiguous blocks of unused IP addresses - not always feasible for enterprise ...
Stephen Lau