Sciweavers

8636 search results - page 1531 / 1728
» How Developers Copy
Sort
View
CISS
2008
IEEE
15 years 10 months ago
Peer-to-Peer utility maximization
—In this paper, we study the problem of utility maximization in Peer-to-Peer (P2P) systems, in which aggregate utilities are maximized by running distributed algorithms on P2P no...
Minghua Chen, Sudipta Sengupta, Miroslav Ponec, Ph...
134
Voted
ICPP
2008
IEEE
15 years 10 months ago
Machine Learning Models to Predict Performance of Computer System Design Alternatives
Computer manufacturers spend a huge amount of time, resources, and money in designing new systems and newer configurations, and their ability to reduce costs, charge competitive p...
Berkin Özisikyilmaz, Gokhan Memik, Alok N. Ch...
127
Voted
NDSS
2008
IEEE
15 years 10 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
VR
2008
IEEE
233views Virtual Reality» more  VR 2008»
15 years 10 months ago
Advanced Multi-Frame Rate Rendering Techniques
Multi-frame rate rendering is a parallel rendering technique that renders interactive parts of the scene on one graphics card while the rest of the scene is rendered asynchronousl...
Jan P. Springer, Christopher Lux, Dirk Reiners, Be...
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
15 years 9 months ago
Performance Analysis of a Middleware Demultiplexing Pattern
A key enabler of the recently adopted, assemblycentric development approach for distributed real-time software systems is QoS-enabled middleware, which provides reusable building ...
U. Praphamontripong, Swapna S. Gokhale, Aniruddha ...
« Prev « First page 1531 / 1728 Last » Next »