Sciweavers

9124 search results - page 1810 / 1825
» Requirements-Based Design Evaluation
Sort
View
CLUSTER
1999
IEEE
14 years 9 months ago
The Network RamDisk: Using remote memory on heterogeneous NOWs
Efficient data storage, a major concern in the modern computer industry, is mostly provided today by the the traditional magnetic disk. Unfortunately the cost of a disk transfer m...
Michail Flouris, Evangelos P. Markatos
CN
1999
242views more  CN 1999»
14 years 9 months ago
Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery
The rapid growth of the World-Wide Web poses unprecedented scaling challenges for general-purpose crawlers and search engines. In this paper we describe a new hypertext resource d...
Soumen Chakrabarti, Martin van den Berg, Byron Dom
JCS
2002
100views more  JCS 2002»
14 years 9 months ago
STATL: An Attack Language for State-Based Intrusion Detection
STATL is an extensible state/transition-based attack description language designed to support intrusion detection. The language allows one to describe computer penetrations as seq...
Steve T. Eckmann, Giovanni Vigna, Richard A. Kemme...
JSS
2002
63views more  JSS 2002»
14 years 9 months ago
Strategies for resolving inter-class data conflicts in mixed real-time database systems
Although many efficient concurrency control protocols have been proposed for real-time database systems, they are mainly designed for the systems with a single type of real-time t...
Kam-yiu Lam, Tei-Wei Kuo, Tony S. H. Lee
MST
1998
91views more  MST 1998»
14 years 9 months ago
An Experimental Analysis of Parallel
We have developed a methodology for predicting the performance of parallel algorithms on real parallel machines. The methodology consists of two steps. First, we characterize a mac...
Guy E. Blelloch, Charles E. Leiserson
« Prev « First page 1810 / 1825 Last » Next »