Sciweavers

4000 search results - page 181 / 800
» Simulation down under
Sort
View
139
Voted
DSN
2004
IEEE
15 years 7 months ago
Dynamic Quarantine of Internet Worms
If we limit the contact rate of worm traffic, can we alleviate and ultimately contain Internet worms? This paper sets out to answer this question. Specifically, we are interested ...
Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Sta...
121
Voted
EUC
2006
Springer
15 years 7 months ago
Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB
- Modern portable or embedded systems support more and more complex applications. These applications make embedded devices require not only low powerconsumption, but also high comp...
Wann-Yun Shieh, Hsin-Dar Chen
157
Voted
AICCSA
2008
IEEE
276views Hardware» more  AICCSA 2008»
15 years 5 months ago
Effects of dimensionality reduction techniques on time series similarity measurements
Time Series are ubiquitous, hence, similarity search is one of the biggest challenges in the area of mining time series data. This is due to the vast data size, number of sequence...
Ghazi Al-Naymat, Javid Taheri
120
Voted
ASPLOS
2008
ACM
15 years 5 months ago
Predictor virtualization
Many hardware optimizations rely on collecting information about program behavior at runtime. This information is stored in lookup tables. To be accurate and effective, these opti...
Ioana Burcea, Stephen Somogyi, Andreas Moshovos, B...
CIKM
2005
Springer
15 years 5 months ago
Handling frequent updates of moving objects
A critical issue in moving object databases is to develop appropriate indexing structures for continuously moving object locations so that queries can still be performed efficien...
Bin Lin, Jianwen Su