Sciweavers

436 search results - page 71 / 88
» On two variations of identifying codes
Sort
View
DSS
2007
75views more  DSS 2007»
14 years 9 months ago
Short Term and Total Life Impact analysis of email worms in computer systems
This paper develops a methodology for analyzing and predicting the impact category of malicious code, particularly email worms. The current paper develops two frameworks to classi...
Insu Park, Raj Sharman, H. Raghav Rao, Shambhu J. ...
MICRO
2006
IEEE
113views Hardware» more  MICRO 2006»
14 years 9 months ago
Exploiting Fine-Grained Data Parallelism with Chip Multiprocessors and Fast Barriers
We examine the ability of CMPs, due to their lower onchip communication latencies, to exploit data parallelism at inner-loop granularities similar to that commonly targeted by vec...
Jack Sampson, Rubén González, Jean-F...
INFSOF
2000
98views more  INFSOF 2000»
14 years 9 months ago
Performance comparison of CORBA and RMI
Distributed object architectures and Java are important for building modern, scalable, web-enabled applications. This paper is focused on qualitative and quantitative comparison o...
Matjaz B. Juric, Ivan Rozman, Marjan Hericko
TC
2002
14 years 9 months ago
Grid Coverage for Surveillance and Target Location in Distributed Sensor Networks
We present novel grid coverage strategies for effective surveillance and target location in distributed sensor networks. We represent the sensor field as a grid (two or three-dimen...
Krishnendu Chakrabarty, S. Sitharama Iyengar, Hair...
WKDD
2010
CPS
238views Data Mining» more  WKDD 2010»
14 years 7 months ago
3D Scientific Data Mining in Ion Trajectories
In physics, structure of glass and ion trajectories are essentially based on statistical analysis of data acquired through experimental measurement and computer simulation [1, 2]. ...
J. M. Sharif, M. Mahadi Abdul Jamil, Md. Asri Ngad...