Sciweavers

2582 search results - page 335 / 517
» Developing a Data Driven System for Computational Neuroscien...
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 1 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
129
Voted
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
15 years 6 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
ICS
1999
Tsinghua U.
15 years 5 months ago
Application scaling under shared virtual memory on a cluster of SMPs
In this paper we examine how application performance scales on a state-of-the-art shared virtual memory (SVM) system on a cluster with 64 processors, comprising 4-way SMPs connect...
Dongming Jiang, Brian O'Kelley, Xiang Yu, Sanjeev ...
ATAL
2008
Springer
15 years 3 months ago
AGENTFLY: a multi-agent airspace test-bed
The contribution presents a multi-agent technology in the domain of the air-traffic control of several autonomous aerial vehicles (manned as well as unmanned). The system has been...
David Sislák, Premysl Volf, Stepán K...
VLSID
2002
IEEE
174views VLSI» more  VLSID 2002»
16 years 1 months ago
Architecture Implementation Using the Machine Description Language LISA
The development of application specific instruction set processors comprises several design phases: architecture exploration, software tools design, system verification and design...
Oliver Schliebusch, Andreas Hoffmann, Achim Nohl, ...