Sciweavers

4745 search results - page 927 / 949
» Discretization: An Enabling Technique
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
14 years 11 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
GRID
2006
Springer
14 years 11 months ago
Labs of the World, Unite!!!
: eScience is rapidly changing the way we do research. As a result, many research labs now need non-trivial computational power. Grid and voluntary computing are well-established s...
Walfredo Cirne, Francisco Vilar Brasileiro, Nazare...
IJES
2006
110views more  IJES 2006»
14 years 11 months ago
Partitioning bin-packing algorithms for distributed real-time systems
Embedded real-time systems must satisfy not only logical functional requirements but also para-functional properties such as timeliness, Quality of Service (QoS) and reliability. W...
Dionisio de Niz, Raj Rajkumar
JCST
2008
94views more  JCST 2008»
14 years 11 months ago
Runtime Engine for Dynamic Profile Guided Stride Prefetching
Stride prefetching is recognized as an important technique to improve memory access performance. The prior work usually profiles and/or analyzes the program behavior offline, and u...
Qiong Zou, Xiao-Feng Li, Long-Bing Zhang
JCB
2006
129views more  JCB 2006»
14 years 11 months ago
GenRate: A Generative Model that Reveals Novel Transcripts in Genome-Tiling Microarray Data
Genome-wide microarray designs containing millions to hundreds of millions of probes are available for a variety of mammals, including mouse and human. These genome tiling arrays ...
Brendan J. Frey, Quaid Morris, Timothy R. Hughes