Sciweavers

1422 search results - page 90 / 285
» Design, Implementation and Performance Evaluation of IP-VPN
Sort
View
CASES
2005
ACM
15 years 1 months ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
AAAI
2008
15 years 1 months ago
Integrating Multiple Learning Components through Markov Logic
This paper addresses the question of how statistical learning algorithms can be integrated into a larger AI system both from a practical engineering perspective and from the persp...
Thomas G. Dietterich, Xinlong Bao
IUI
2011
ACM
14 years 2 months ago
Protractor3D: a closed-form solution to rotation-invariant 3D gestures
Protractor 3D is a gesture recognizer that extends the 2D touch screen gesture recognizer Protractor [8] to 3D gestures. It inherits many of Protractor’s desirable properties, s...
Sven G. Kratz, Michael Rohs
CORR
2002
Springer
156views Education» more  CORR 2002»
14 years 11 months ago
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Ian T. Foster, Adriana Iamnitchi
NOMS
2000
IEEE
176views Communications» more  NOMS 2000»
15 years 3 months ago
Design and analysis of a proactive application management system (PAMS)
Management of large-scale Network-Centric Systems (NCS) and their applications is an extremely complex and challenging task due to factors such as centralized management architect...
Salim Hariri, Yoonhee Kim