Sciweavers

720 search results - page 94 / 144
» Machine scheduling with resource dependent processing times
Sort
View
CSREASAM
2009
15 years 5 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 4 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
COR
2010
164views more  COR 2010»
15 years 4 months ago
The distributed permutation flowshop scheduling problem
This paper studies a new generalization of the regular permutation flowshop scheduling problem (PFSP) referred to as the distributed permutation flowshop scheduling problem or DPF...
B. Naderi, Rubén Ruiz
TCS
2002
15 years 3 months ago
Asymptotic behavior in a heap model with two pieces
In a heap model, solid blocks, or pieces, pile up according to the Tetris game mechanism. An optimal schedule is an in nite sequence of pieces minimizing the asymptotic growth rat...
Jean Mairesse, Laurent Vuillon
MICRO
2003
IEEE
132views Hardware» more  MICRO 2003»
15 years 9 months ago
Checkpoint Processing and Recovery: Towards Scalable Large Instruction Window Processors
Large instruction window processors achieve high performance by exposing large amounts of instruction level parallelism. However, accessing large hardware structures typically req...
Haitham Akkary, Ravi Rajwar, Srikanth T. Srinivasa...