Sciweavers

420 search results - page 48 / 84
» Discovering Conditional Functional Dependencies
Sort
View
MASCOTS
2004
15 years 5 months ago
A Computational Complexity-Aware Model for Performance Analysis of Software Servers
Queueing models are routinely used to analyze the performance of software systems. However, contrary to common assumptions, the time that a software server takes to complete jobs ...
Vipul Mathur, Varsha Apte
MIS
2008
Springer
130views Multimedia» more  MIS 2008»
15 years 4 months ago
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is...
Essam Natsheh, Tat Chee Wan
ICCAD
2009
IEEE
119views Hardware» more  ICCAD 2009»
15 years 2 months ago
Iterative layering: Optimizing arithmetic circuits by structuring the information flow
Current logic synthesis techniques are ineffective for arithmetic circuits. They perform poorly for XOR-dominated circuits, and those with a high fan-in dependency between inputs ...
Ajay K. Verma, Philip Brisk, Paolo Ienne
MSOM
2011
14 years 7 months ago
Volume Flexibility, Product Flexibility, or Both: The Role of Demand Correlation and Product Substitution
We analyze volume flexibility — the ability to produce above/below the installed capacity for a product — under endogenous pricing in a two-product setting. We discover that ...
Manu Goyal, Serguei Netessine
DIMVA
2008
15 years 5 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...