Sciweavers

3303 search results - page 565 / 661
» Multidimensional Access Methods
Sort
View

Publication
145views
14 years 6 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...
AROBOTS
2011
14 years 5 months ago
Large scale graph-based SLAM using aerial images as prior information
— To effectively navigate in their environments and accurately reach their target locations, mobile robots require a globally consistent map of the environment. The problem of le...
Rainer Kümmerle, Bastian Steder, Christian Do...
CSC
2010
14 years 4 months ago
Performance Modeling, Analysis, and Optimization of Cell-List Based Molecular Dynamics
- We have developed a performance prediction model for non-bonded interaction computations in molecular dynamics simulations, thereby predicting the optimal cell dimension in a lin...
Manaschai Kunaseth, Rajiv K. Kalia, Aiichiro Nakan...
SIGMETRICS
2011
ACM
198views Hardware» more  SIGMETRICS 2011»
14 years 4 months ago
Memory Trace Compression and Replay for SPMD Systems using Extended PRSDs?
Concurrency levels in large-scale supercomputers are rising exponentially, and shared-memory nodes with hundreds of cores and non-uniform memory access latencies are expected with...
Sandeep Budanur, Frank Mueller, Todd Gamblin
PROMISE
2010
14 years 4 months ago
Replication of defect prediction studies: problems, pitfalls and recommendations
Background: The main goal of the PROMISE repository is to enable reproducible, and thus verifiable or refutable research. Over time, plenty of data sets became available, especial...
Thilo Mende