Sciweavers

420 search results - page 48 / 84
» Discovering Conditional Functional Dependencies
Sort
View
82
Voted
MASCOTS
2004
15 years 2 months ago
A Computational Complexity-Aware Model for Performance Analysis of Software Servers
Queueing models are routinely used to analyze the performance of software systems. However, contrary to common assumptions, the time that a software server takes to complete jobs ...
Vipul Mathur, Varsha Apte
91
Voted
MIS
2008
Springer
130views Multimedia» more  MIS 2008»
15 years 19 days ago
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is...
Essam Natsheh, Tat Chee Wan
105
Voted
ICCAD
2009
IEEE
119views Hardware» more  ICCAD 2009»
14 years 10 months ago
Iterative layering: Optimizing arithmetic circuits by structuring the information flow
Current logic synthesis techniques are ineffective for arithmetic circuits. They perform poorly for XOR-dominated circuits, and those with a high fan-in dependency between inputs ...
Ajay K. Verma, Philip Brisk, Paolo Ienne
143
Voted
MSOM
2011
14 years 3 months ago
Volume Flexibility, Product Flexibility, or Both: The Role of Demand Correlation and Product Substitution
We analyze volume flexibility — the ability to produce above/below the installed capacity for a product — under endogenous pricing in a two-product setting. We discover that ...
Manu Goyal, Serguei Netessine
DIMVA
2008
15 years 2 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...