Sciweavers

11573 search results - page 2216 / 2315
» Designing Relational Databases
Sort
View
ACSAC
2008
IEEE
15 years 9 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ACSC
2008
IEEE
15 years 9 months ago
HOVER: hybrid on-demand distance vector routing for wireless mesh networks
Abstract— Hybrid Wireless Mesh Networks are a combination of mobile ad hoc networks and infrastructure wireless mesh networks, consisting of two types of nodes: Mobile Mesh Clien...
Stephan Mir, Asad Amir Pirzada, Marius Portmann
DATE
2008
IEEE
113views Hardware» more  DATE 2008»
15 years 9 months ago
Compositional, dynamic cache management for embedded chip multiprocessors
This paper proposes a dynamic cache repartitioning technique that enhances compositionality on platforms executing media applications with multiple utilization scenarios. The repa...
Anca Mariana Molnos, Marc J. M. Heijligers, Sorin ...
IEEEPACT
2008
IEEE
15 years 9 months ago
Distributed cooperative caching
This paper presents the Distributed Cooperative Caching, a scalable and energy-efficient scheme to manage chip multiprocessor (CMP) cache resources. The proposed configuration is...
Enric Herrero, José González, Ramon ...
IPPS
2008
IEEE
15 years 9 months ago
Modeling and predicting application performance on parallel computers using HPC challenge benchmarks
A method is presented for modeling application performance on parallel computers in terms of the performance of microkernels from the HPC Challenge benchmarks. Specifically, the a...
Wayne Pfeiffer, Nicholas J. Wright
« Prev « First page 2216 / 2315 Last » Next »