Sciweavers

13822 search results - page 2537 / 2765
» Models in Knowledge Management
Sort
View
CACM
2008
100views more  CACM 2008»
15 years 4 months ago
TxLinux and MetaTM: transactional memory and the operating system
TxLinux is the first operating system to use hardware transactional memory (HTM) as a synchronization primitive, and the first to manage HTM in the scheduler. TxLinux, which is a ...
Christopher J. Rossbach, Hany E. Ramadan, Owen S. ...
COMCOM
2008
138views more  COMCOM 2008»
15 years 4 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CORR
2010
Springer
149views Education» more  CORR 2010»
15 years 4 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
CONCURRENCY
2008
112views more  CONCURRENCY 2008»
15 years 4 months ago
Building and applying geographical information system Grids
: We discuss the development and application of Web Service-based Geographical Information System Grids. Following the WS-I+ approach of building Grids on Web Service standards, we...
Galip Aydin, Ahmet Sayar, Harshawardhan Gadgil, Me...
DEBU
2008
141views more  DEBU 2008»
15 years 4 months ago
Oracle's SQL Performance Analyzer
We present the SQL Performance Analyzer, a novel approach in Oracle Database 11g to testing database changes, such as upgrades, parameter changes, schema changes, and gathering op...
Khaled Yagoub, Peter Belknap, Benoît Dagevil...
« Prev « First page 2537 / 2765 Last » Next »