Sciweavers

5234 search results - page 968 / 1047
» Simulation of Computer Network Attacks
Sort
View
HPCA
2002
IEEE
16 years 3 months ago
Bandwidth Adaptive Snooping
This paper advocates that cache coherence protocols use a bandwidth adaptive approach to adjust to varied system configurations (e.g., number of processors) and workload behaviors...
Milo M. K. Martin, Daniel J. Sorin, Mark D. Hill, ...
DCC
2008
IEEE
16 years 2 months ago
Distributed Multi-stage Coding of Correlated Sources
This paper considers the problem of distributed scalable coding of correlated sources that are communicated to a central unit. The general setting is typically encountered in sens...
Ankur Saxena, Kenneth Rose
COMPLEX
2009
Springer
15 years 9 months ago
A Preliminary Study on the Effects of Fear Factors in Disease Propagation
Upon an outbreak of a dangerous infectious disease, people generally tend to reduce their contacts with others in fear of getting infected. Such typical actions apparently help to ...
Yubo Wang, Jie Hu, Gaoxi Xiao, Limsoon Wong, Stefa...
ICDCS
2008
IEEE
15 years 9 months ago
Sensor Node Localization Using Uncontrolled Events
Many event-driven localization methods have been proposed as low cost, energy efficient solutions for wireless senor networks. In order to eliminate the requirement of accurately...
Ziguo Zhong, Dan Wang, Tian He
IPPS
2008
IEEE
15 years 9 months ago
A study of master-slave approaches to parallelize NSGA-II
Many of the optimization problems from the real world are multiobjective in nature, and the reference algorithm for multiobjective optimization is NSGA-II. Frequently, these probl...
Juan José Durillo, Antonio J. Nebro, Franci...