Sciweavers

1424 search results - page 175 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
WSC
2000
15 years 2 months ago
Teaching system modeling, simulation and validation
Simulation is used in the design process of dynamic systems. The results of simulation are employed for validating a model, and they are helpful for the improvement of the design ...
Jörg Desel
EUROPAR
2000
Springer
15 years 5 months ago
Design and Evaluation of a Compiler-Directed Collective I/O Technique
Abstract. Current approaches to parallel I/O demand extensive user effort to obtain acceptable performance. This is in part due to difficulties in understanding the characteristics...
Gokhan Memik, Mahmut T. Kandemir, Alok N. Choudhar...
CODES
2000
IEEE
15 years 6 months ago
Co-design of interleaved memory systems
Memory interleaving is a cost-efficient approach to increase bandwidth. Improving data access locality and reducing memory access conflicts are two important aspects to achieve hi...
Hua Lin, Wayne Wolf
CSCW
2004
ACM
15 years 7 months ago
Introducing collaboration into an application development environment
We present contextual collaboration, an approach to building collaborative systems that embeds collaborative capabilities into core applications, and discuss its advantages. We de...
Susanne Hupfer, Li-Te Cheng, Steven Ross, John F. ...
ACSAC
2008
IEEE
15 years 8 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh