Sciweavers

2200 search results - page 345 / 440
» Hop Integrity in Computer Networks
Sort
View
156
Voted
ACSC
2006
IEEE
15 years 9 months ago
A framework for visual data mining of structures
Visual data mining has been established to effectively analyze large, complex numerical data sets. Especially, the extraction and visualization of inherent structures such as hie...
Hans-Jörg Schulz, Thomas Nocke, Heidrun Schum...
SLIP
2006
ACM
15 years 9 months ago
Statistical crosstalk aggressor alignment aware interconnect delay calculation
Crosstalk aggressor alignment induces significant interconnect delay variation and needs to be taken into account in a statistical timer. In this paper, we approximate crosstalk ...
Andrew B. Kahng, Bao Liu, Xu Xu
DSN
2005
IEEE
15 years 9 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
SLIP
2005
ACM
15 years 8 months ago
A 3-D FPGA wire resource prediction model validated using a 3-D placement and routing tool
The interconnection architecture of FPGAs such as switches dominates performance of FPGAs. Three-dimensional integration of FPGAs overcomes interconnect limitations by allowing in...
Young-Su Kwon, Payam Lajevardi, Anantha P. Chandra...
MM
2004
ACM
116views Multimedia» more  MM 2004»
15 years 8 months ago
First-year students' paper chase: a mobile location-aware multimedia game
The latest achievements in the field of mobile networks and ubiquitous computing enable the integration and combination of technologies like Internet, Java, and multimedia in a n...
Palle Klante, Jens Krösche, Daniela Ratt, Sus...