Sciweavers

3053 search results - page 333 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
ACSAC
2000
IEEE
15 years 7 months ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford
WSC
1997
15 years 4 months ago
Java Based Conservative Distributed Simulation
Distributed discrete event simulation techniques aim at an acceleration of the execution of a self-contained simulation model by the spatial decomposition of that model and the co...
Alois Ferscha, Michael Richter
ICS
2009
Tsinghua U.
15 years 9 months ago
Fast and scalable list ranking on the GPU
General purpose programming on the graphics processing units (GPGPU) has received a lot of attention in the parallel computing community as it promises to offer the highest perfo...
M. Suhail Rehman, Kishore Kothapalli, P. J. Naraya...
ECAL
2007
Springer
15 years 9 months ago
A Computational System for Investigating Chemotaxis-Based Cell Aggregation
Abstract. We have developed a software system that simulates chemotaxis-based cell aggregation in 2D. The model implemented within the system consists of such cell behaviors as che...
Manolya Eyiyurekli, Peter I. Lelkes, David E. Bree...
119
Voted
ICPP
2000
IEEE
15 years 7 months ago
Simultaneous Multithreading-Based Routers
This work considers the use of a n S M T (simultaneous multithreading) processor in lieu of the conventional processor(s) in a router and evaluates quantitatively the potential ga...
Kemathat Vibhatavanij, Nian-Feng Tzeng, Angkul Kon...