Sciweavers

2874 search results - page 564 / 575
» Intrusion Detection: Systems and Models
Sort
View
SPAA
2010
ACM
15 years 4 months ago
Implementing and evaluating nested parallel transactions in software transactional memory
Transactional Memory (TM) is a promising technique that simplifies parallel programming for shared-memory applications. To date, most TM systems have been designed to efficientl...
Woongki Baek, Nathan Grasso Bronson, Christos Kozy...
117
Voted
SIGGRAPH
1992
ACM
15 years 3 months ago
Interval analysis for computer graphics
This paper discusses how interval analysis can be used to solve a wide variety of problems in computer graphics. These problems include ray tracing, interference detection, polygo...
John M. Snyder
109
Voted
CCS
2006
ACM
15 years 3 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
CBMS
2001
IEEE
15 years 3 months ago
An Interoperable Data Architecture for Data Exchange in a Biomedical Research Network
Knowledge discovery and data correlation require a unified approach to basic data management. However, achieving such an approach is nearly impossible with hundreds of disparate d...
Daniel J. Crichton, J. Steven Hughes, Gregory J. D...
102
Voted
EDBTW
2010
Springer
15 years 3 months ago
The benefits of the interaction between data warehouses and question answering
Business Intelligence (BI) applications allow their users to query, understand, and analyze existing data within their organizations in order to acquire useful knowledge, thus mak...
Antonio Ferrández, Jesús Peral