Sciweavers

12032 search results - page 2308 / 2407
» Simulation of Manufacturing Systems
Sort
View
PLDI
2009
ACM
15 years 10 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
CLUSTER
2009
IEEE
15 years 10 months ago
Utility analysis for Internet-oriented server consolidation in VM-based data centers
—Server consolidation based on virtualization technology will simplify system administration, reduce the cost of power and physical infrastructure, and improve utilization in tod...
Ying Song, Yanwei Zhang, Yuzhong Sun, Weisong Shi
CSE
2009
IEEE
15 years 10 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis
DATE
2009
IEEE
242views Hardware» more  DATE 2009»
15 years 10 months ago
A high performance reconfigurable Motion Estimation hardware architecture
Motion Estimation (ME) is the most computationally intensive part of video compression and video enhancement systems. For the recently available high definition frame sizes and hi...
Ozgur Tasdizen, Halil Kukner, Abdulkadir Akin, Ilk...
GLOBECOM
2009
IEEE
15 years 10 months ago
Maximum-Likelihood Sequence Detector for Dynamic Mode High Density Probe Storage
— There is an ever increasing need for storing data in smaller and smaller form factors driven by the ubiquitous use and increased demands of consumer electronics. A new approach...
Naveen Kumar, Pranav Agarwal, Aditya Ramamoorthy, ...
« Prev « First page 2308 / 2407 Last » Next »