Sciweavers

5333 search results - page 112 / 1067
» Optimizing Computer System Configurations
Sort
View
VLSID
2005
IEEE
121views VLSI» more  VLSID 2005»
16 years 2 months ago
A Heuristic for Peak Power Constrained Design of Network-on-Chip (NoC) Based Multimode Systems
Designing NoC-based systems has become increasingly complex with support for multiple functionalities. Decisions regarding interconnections between the heterogeneous system compon...
Praveen Bhojwani, Rabi N. Mahapatra, Eun Jung Kim,...
CEC
2007
IEEE
15 years 6 months ago
Support vector machines for computing action mappings in learning classifier systems
XCS with Computed Action, briefly XCSCA, is a recent extension of XCS to tackle problems involving a large number of discrete actions. In XCSCA the classifier action is computed wi...
Daniele Loiacono, Andrea Marelli, Pier Luca Lanzi
JNSM
2008
93views more  JNSM 2008»
15 years 2 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
ITS
2010
Springer
134views Multimedia» more  ITS 2010»
15 years 6 months ago
Learning to Argue Using Computers - A View from Teachers, Researchers, and System Developers
The ability to argue is essential in many aspects of life, but traditional face-to-face tutoring approaches do not scale up well. A solution for this dilemma may be computer-suppor...
Frank Loll, Oliver Scheuer, Bruce M. McLaren, Niel...
ICDCS
2000
IEEE
15 years 6 months ago
Graceful Quorum Reconfiguration in a Robust Emulation of Shared Memory
Providing shared-memory abstraction in messagepassing systems often simplifies the development of distributed algorithms and allows for the reuse of sharedmemory algorithms in the...
Burkhard Englert, Alexander A. Shvartsman