Sciweavers

6229 search results - page 965 / 1246
» Models of Computation for Networks on Chip
Sort
View
101
Voted
MOBIDE
2010
ACM
15 years 23 days ago
A cooperative spatial-aware cache for mobile environments
In many scenarios, particularly in military and emergency response operations, mobile nodes that are in close proximity to each other exhibit a high degree of data affinity. For ex...
Fernando J. Maymi, Manuel Rodriguez-Martinez, Wolf...
97
Voted
PC
1998
123views Management» more  PC 1998»
15 years 6 days ago
Designing communication strategies for heterogeneous parallel systems
This paper investigates communication strategies for interconnecting heterogeneous parallel systems. As the speed of processors and parallel systems keep on increasing over the ye...
Ravi Prakash, Dhabaleswar K. Panda
RAID
2010
Springer
14 years 11 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
128
Voted
PRL
2011
14 years 7 months ago
Consistency of functional learning methods based on derivatives
In some real world applications, such as spectrometry, functional models achieve better predictive performances if they work on the derivatives of order m of their inputs rather t...
Fabrice Rossi, Nathalie Villa-Vialaneix
117
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 7 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto