Sciweavers

1040 search results - page 101 / 208
» Resource Usage Verification
Sort
View
GRAPHITE
2004
ACM
15 years 8 months ago
Handheld devices for applications using dynamic multimedia data
Growing demand for ubiquitous and pervasive computing has triggered a sharp rise in handheld device usage. At the same time, dynamic multimedia data has become accepted as core ma...
Binh Pham, On Wong
MOBICOM
2004
ACM
15 years 8 months ago
Towards service and user discovery on wireless networks
This work presents a user position management system for Wi-Fi networks. The location system is based on access point coverage range and beacon devices. The implementation was mad...
Andrei Oliveira da Silva, Paulo Henrique de Souza ...
ISVLSI
2003
IEEE
147views VLSI» more  ISVLSI 2003»
15 years 8 months ago
Automated Dynamic Memory Data Type Implementation Exploration and Optimization
The behavior of many algorithms is heavily determined by the input data. Furthermore, this often means that multiple and completely different execution paths can be followed, also...
Marc Leeman, Chantal Ykman-Couvreur, David Atienza...
SBACPAD
2003
IEEE
111views Hardware» more  SBACPAD 2003»
15 years 8 months ago
Boosting Performance for I/O-Intensive Workload by Preemptive Job Migrations in a Cluster System
Load balancing in a cluster system has been investigated extensively, mainly focusing on the effective usage of global CPU and memory resources. However, if a significant portion ...
Xiao Qin, Hong Jiang, Yifeng Zhu, David R. Swanson
AUSAI
2003
Springer
15 years 8 months ago
Combining Multiple Host-Based Detectors Using Decision Tree
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
Sang-Jun Han, Sung-Bae Cho