Sciweavers

2774 search results - page 92 / 555
» Exploiting Deep Structure
Sort
View
IEEEARES
2009
IEEE
15 years 6 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
ICC
2009
IEEE
186views Communications» more  ICC 2009»
15 years 6 months ago
Power Allocations for Adaptive Distributed MIMO Multi-Hop Networks
—Distributed MIMO multi-hop relaying is one of the most promising technologies that permits cost-effective improvement of coverage, data rate and end-to-end (e2e) user experience...
Yidong Lang, Dirk Wübben, Karl-Dirk Kammeyer
PDP
2005
IEEE
15 years 5 months ago
WAS Control Center: An Autonomic Performance-Triggered Tracing Environment for WebSphere
Studying any aspect of an application server with high availability requirements can become a tedious task when a continuous monitoring of the server status is necessary. The crea...
David Carrera, David Garcia, Jordi Torres, Eduard ...
95
Voted
VLSID
2005
IEEE
105views VLSI» more  VLSID 2005»
15 years 5 months ago
Placement and Routing for 3D-FPGAs Using Reinforcement Learning and Support Vector Machines
The primary advantage of using 3D-FPGA over 2D-FPGA is that the vertical stacking of active layers reduce the Manhattan distance between the components in 3D-FPGA than when placed...
R. Manimegalai, E. Siva Soumya, V. Muralidharan, B...
ASPLOS
2004
ACM
15 years 5 months ago
Scalable selective re-execution for EDGE architectures
Pipeline flushes are becoming increasingly expensive in modern microprocessors with large instruction windows and deep pipelines. Selective re-execution is a technique that can r...
Rajagopalan Desikan, Simha Sethumadhavan, Doug Bur...