Sciweavers

209 search results - page 40 / 42
» Effective Shadow Detection in Traffic Monitoring Application...
Sort
View
TIT
2008
122views more  TIT 2008»
13 years 6 months ago
Identifying Codes and Covering Problems
The identifying code problem for a given graph involves finding a minimum set of vertices whose neighborhoods uniquely overlap at any given graph vertex. Initially introduced in 1...
Moshe Laifenfeld, Ari Trachtenberg
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 6 days ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
RIAO
2004
13 years 7 months ago
Improving Ontology-Based User Profiles
Personalized Web browsing and search hope to provide Web information that matches a user's personal interests and thus provide more effective and efficient information access...
Joana Trajkova, Susan Gauch
RAID
1999
Springer
13 years 10 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
FPL
2004
Springer
164views Hardware» more  FPL 2004»
13 years 10 months ago
Dynamic Prefetching in the Virtual Memory Window of Portable Reconfigurable Coprocessors
Abstract. In Reconfigurable Systems-On-Chip (RSoCs), operating systems can primarily (1) manage the sharing of limited reconfigurable resources, and (2) support communication betwe...
Miljan Vuletic, Laura Pozzi, Paolo Ienne