Sciweavers

453 search results - page 83 / 91
» From restrictive to prescriptive design
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
IEEEPACT
2007
IEEE
15 years 4 months ago
Performance Portable Optimizations for Loops Containing Communication Operations
Effective use of communication networks is critical to the performance and scalability of parallel applications. Partitioned Global Address Space languages like UPC bring the pro...
Costin Iancu, Wei Chen, Katherine A. Yelick
ICPP
2006
IEEE
15 years 3 months ago
A Flexible and Dynamic Infrastructure for MPI Tool Interoperability
The MPI standard provides tool builders with an efficient profiling interface, PMPI. Although many tools have successfully used this interface, it has three major drawbacks: a n...
Martin Schulz, Bronis R. de Supinski
ISPD
2006
ACM
158views Hardware» more  ISPD 2006»
15 years 3 months ago
Effective linear programming based placement methods
Linear programming (LP) based methods are attractive for solving the placement problem because of their ability to model Half-Perimeter Wirelength (HPWL) and timing. However, it h...
Sherief Reda, Amit Chowdhary
90
Voted
JCDL
2006
ACM
159views Education» more  JCDL 2006»
15 years 3 months ago
EcoPod: a mobile tool for community based biodiversity collection building
Biological studies rely heavily on large collections of species observations. All of these collections cannot be compiled by biology professionals alone. Skilled amateurs can assi...
YuanYuan Yu, Jeannie A. Stamberger, Aswath Manohar...