Sciweavers

16822 search results - page 3248 / 3365
» Designing Simulation Experiments
Sort
View
ACSAC
2008
IEEE
15 years 7 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
103
Voted
C5
2008
IEEE
15 years 7 months ago
Remote Opportunities: A Rethinking and Retooling
Introducing technology as a sustainable means of creating, connecting, and collaborating introduces the need to carefully consider subtle aspects of deployment strategies and supp...
Yagiz Onat Yazir, Katherine Gunion, Christopher Pe...
107
Voted
CGO
2008
IEEE
15 years 7 months ago
Parallel-stage decoupled software pipelining
In recent years, the microprocessor industry has embraced chip multiprocessors (CMPs), also known as multi-core architectures, as the dominant design paradigm. For existing and ne...
Easwaran Raman, Guilherme Ottoni, Arun Raman, Matt...
105
Voted
CODES
2008
IEEE
15 years 7 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...
114
Voted
COMSWARE
2008
IEEE
15 years 7 months ago
Call admission control: QoS issue for VoIP
—One of the vital key elements for providing Quality of Service (QoS) for VoIP is the Call Admission Control (CAC) capabilities of the Session Management /Call Session Control Fu...
Mohammad Asadul Hoque, Farhana Afroz
« Prev « First page 3248 / 3365 Last » Next »