Sciweavers

3999 search results - page 662 / 800
» Design of Optical Access Systems using Computer Modeling
Sort
View
172
Voted
ISI
2008
Springer
15 years 5 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
WACV
2005
IEEE
15 years 10 months ago
Learning the Behavior of Users in a Public Space through Video Tracking
The paper describes a video tracking system that tracks and analyzes the behavioral pattern of users in a public space. We have obtained important statistical measurements about u...
Wei Yan, David A. Forsyth
MIDDLEWARE
2007
Springer
15 years 11 months ago
Removing the need for state dissemination in grid resource brokering
Resource brokering in Grids is nowadays handled by resource brokers that require detailed knowledge of the state of the resources that they broker. In business settings, surrender...
Peer Hasselmeyer
177
Voted
EAGC
2003
Springer
15 years 10 months ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
LCTRTS
2010
Springer
15 years 12 months ago
Analysis and approximation for bank selection instruction minimization on partitioned memory architecture
A large number of embedded systems include 8-bit microcontrollers for their energy efficiency and low cost. Multi-bank memory architecture is commonly applied in 8-bit microcontr...
Minming Li, Chun Jason Xue, Tiantian Liu, Yingchao...