Sciweavers

25908 search results - page 217 / 5182
» Predictable Network Computing
Sort
View
RAID
1999
Springer
15 years 6 months ago
Intrusion Detection for an On-Going Attack
An intrusion-detection system (IDS) for an on-going attack is described. Prior to an attack, an IDS operates in anticipation of a general threat. During an attack, the IDS can dea...
Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Y...
DSN
2008
IEEE
15 years 3 months ago
An accurate flip-flop selection technique for reducing logic SER
The combination of continued technology scaling and increased on-chip transistor densities has made vulnerability to radiation induced soft errors a significant design concern. In...
Eric L. Hill, Mikko H. Lipasti, Kewal K. Saluja
PUC
2011
14 years 8 months ago
A research methodology for evaluating location aware experiences
Abstract Research field trials of fully functional prototypes of location-based games are an effective way to test game designs and develop an understanding of what makes games co...
Josephine Reid, Richard Hull 0002, Ben J. C. Clayt...
115
Voted
ICALP
2003
Springer
15 years 7 months ago
Problems on RNA Secondary Structure Prediction and Design
We describe several computational problems on prediction and design of RNA molecules.
Anne Condon
BROADNETS
2007
IEEE
15 years 8 months ago
Reduced flow routing: Leveraging residual capacity to reduce blocking in GMPLS networks
— Traffic engineering has been extensively studied to maximize network resource utilization while minimizing call blocking [1]. As the the demand for high data rate services ove...
Xiaolan J. Zhang, Sun-il Kim, Steven S. Lumetta