Sciweavers

2779 search results - page 237 / 556
» Modelling Immunological Memory
Sort
View
HPCA
2002
IEEE
15 years 9 months ago
User-Level Communication in Cluster-Based Servers
Clusters of commodity computers are currently being used to provide the scalability required by severalpopular Internet services. In this paper we evaluate an efficient cluster-b...
Enrique V. Carrera, Srinath Rao, Liviu Iftode, Ric...
192
Voted
ICPIA
1992
15 years 8 months ago
Parallel Manipulations of Octrees and Quadtrees
Abstract. Octrees o er a powerful means for representing and manipulating 3-D objects. This paper presents an implementation of octree manipulations using a new approach on a share...
Vipin Chaudhary, K. Kamath, Prakash Arunachalam, J...
ECIS
2000
15 years 6 months ago
Perspectives on Knowledge Management Systems - Theoretical Framework and Design of an Empirical Study
Abstract- This paper deals with "Knowledge Management Systems" (KMS) which are seen as a new kind of information systems supporting organizational information processing....
Ronald Maier, Franz Lehner
COGSCI
2007
79views more  COGSCI 2007»
15 years 4 months ago
Contextualizing Counterintuitiveness: How Context Affects Comprehension and Memorability of Counterintuitive Concepts
A number of anthropologists have argued that religious concepts are minimally counterintuitive and that this gives them mnemic advantages. This paper addresses the question of why...
M. Afzal Upala, Lauren O. Gonce, Ryan D. Tweney, D...
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...