Sciweavers

6978 search results - page 1306 / 1396
» Reframing Requirements Analysis
Sort
View
CCS
2005
ACM
15 years 3 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
ASPLOS
2004
ACM
15 years 3 months ago
Formal online methods for voltage/frequency control in multiple clock domain microprocessors
Multiple Clock Domain (MCD) processors are a promising future alternative to today’s fully synchronous designs. Dynamic Voltage and Frequency Scaling (DVFS) in an MCD processor ...
Qiang Wu, Philo Juang, Margaret Martonosi, Douglas...
CF
2004
ACM
15 years 3 months ago
A first glance at Kilo-instruction based multiprocessors
The ever increasing gap between processor and memory speed, sometimes referred to as the Memory Wall problem [42], has a very negative impact on performance. This mismatch will be...
Marco Galluzzi, Valentin Puente, Adrián Cri...
DOCENG
2004
ACM
15 years 3 months ago
Instructional information in adaptive spatial hypertext
Spatial hypertext is an effective medium for the delivery of help and instructional information on the Web. Spatial hypertext’s intrinsic features allow documents to visually re...
Luis Francisco-Revilla, Frank M. Shipman III
DOCENG
2004
ACM
15 years 3 months ago
Querying XML documents by dynamic shredding
With the wide adoption of XML as a standard data representation and exchange format, querying XML documents becomes increasingly important. However, relational database systems co...
Hui Zhang 0003, Frank Wm. Tompa
« Prev « First page 1306 / 1396 Last » Next »