Sciweavers

1094 search results - page 133 / 219
» On Computing Explanations in Argumentation
Sort
View
NDSS
2003
IEEE
15 years 4 months ago
Detecting Service Violations and DoS Attacks
Denial of Service (DoS) attacks are a serious threat for the Internet. DoS attacks can consume memory, CPU, and network resources and damage or shut down the operation of the reso...
Ahsan Habib, Mohamed Hefeeda, Bharat K. Bhargava
HPCC
2009
Springer
15 years 3 months ago
On the Performance of Commit-Time-Locking Based Software Transactional Memory
Compared with lock-based synchronization techniques, Software Transactional Memory (STM) can significantly improve the programmability of multithreaded applications. Existing res...
Zhengyu He, Bo Hong
ICPADS
2000
IEEE
15 years 3 months ago
Java 2 Distributed Object Models Performance Analysis, Comparison and Optimization
This paper is focused on the performance analysis, comparison and optimization of the most important distributed object models for Java: RMI (Remote Method Invocation) and RMI-IIO...
Matjaz B. Juric, Ivan Rozman, Alan P. Stevens, Mar...
DIS
1998
Springer
15 years 3 months ago
Automatic Transaction of Signal via Statistical Modeling
The statistical information processing can be characterized by the likelihood function de ned by giving an explicit form for an approximation to the true distribution. This mathema...
Genshiro Kitagawa, Tomoyuki Higuchi
APCHI
2004
IEEE
15 years 2 months ago
Age Differences in Rendezvousing: 18-30s Vs. 31-45s
One strategy for increasing the usefulness, ease of use and satisfaction of wireless navigation and related services is to tailor a package of services to meet the requirements of ...
Martin Colbert