Sciweavers

7080 search results - page 1229 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
126
Voted
TIFS
2008
142views more  TIFS 2008»
15 years 3 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
223
Voted
TC
2011
14 years 10 months ago
Energy Reduction in Consolidated Servers through Memory-Aware Virtual Machine Scheduling
—Increasing energy consumption in server consolidation environments leads to high maintenance costs for data centers. Main memory, no less than processor, is a major energy consu...
Jae-Wan Jang, Myeongjae Jeon, Hyo-Sil Kim, Heeseun...
106
Voted
CHI
2004
ACM
16 years 3 months ago
If not now, when?: the effects of interruption at different moments within task execution
User attention is a scarce resource, and users are susceptible to interruption overload. Systems do not reason about the effects of interrupting a user during a task sequence. In ...
Piotr D. Adamczyk, Brian P. Bailey
OSDI
2008
ACM
16 years 3 months ago
Improving MapReduce Performance in Heterogeneous Environments
MapReduce is emerging as an important programming model for large-scale data-parallel applications such as web indexing, data mining, and scientific simulation. Hadoop is an open-...
Matei Zaharia, Andy Konwinski, Anthony D. Joseph, ...
124
Voted
EDBT
2008
ACM
120views Database» more  EDBT 2008»
16 years 3 months ago
Schema mapping verification: the spicy way
Schema mapping algorithms rely on value correspondences ? i.e., correspondences among semantically related attributes ? to produce complex transformations among data sources. Thes...
Angela Bonifati, Giansalvatore Mecca, Alessandro P...
« Prev « First page 1229 / 1416 Last » Next »