Sciweavers

8468 search results - page 1362 / 1694
» The Technology of Data Stashing
Sort
View
ICEIS
2008
IEEE
15 years 5 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
IEEESCC
2008
IEEE
15 years 5 months ago
A Graphical Approach to Providing Infrastructure Recommendations for IT
We present SPIRIT, a Service for Providing Infrastructure Recommendations for Information Technology. SPIRIT allows maintenance support providers for Small-to-Medium Businesses (S...
Ashwin Lall, Anca Sailer, Mark Brodie
IISWC
2008
IEEE
15 years 5 months ago
PARSEC vs. SPLASH-2: A quantitative comparison of two multithreaded benchmark suites on Chip-Multiprocessors
The PARSEC benchmark suite was recently released and has been adopted by a significant number of users within a short amount of time. This new collection of workloads is not yet ...
Christian Bienia, Sanjeev Kumar, Kai Li
ISCAS
2008
IEEE
110views Hardware» more  ISCAS 2008»
15 years 5 months ago
Distortion calculation of an asynchronous switching xDSL line-driver
Abstract—Since the xDSL specifications impose stringent linearity requirements to ensure the integrity of the data transferred, current line drivers use linear amplifiers. The do...
Vincent De Gezelle, Jordie Buyle, Jan Doutreloigne
ISCC
2008
IEEE
152views Communications» more  ISCC 2008»
15 years 5 months ago
Efficient delivery of MBMS multicast traffic over HSDPA
Multimedia Broadcast/Multicast Service (MBMS) and High-Speed Downlink Packet Access (HSDPA) are two key technologies that constitute a significant step towards the Mobile Broadban...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...
« Prev « First page 1362 / 1694 Last » Next »