Sciweavers

82 search results - page 12 / 17
» The potential energy of knowledge flow
Sort
View
IPPS
2010
IEEE
14 years 10 months ago
A distributed diffusive heuristic for clustering a virtual P2P supercomputer
Abstract--For the management of a virtual P2P supercomputer one is interested in subgroups of processors that can communicate with each other efficiently. The task of finding these...
Joachim Gehweiler, Henning Meyerhenke
ACSAC
2008
IEEE
15 years 6 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
116
Voted
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
15 years 6 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
DILS
2005
Springer
15 years 5 months ago
Factors Affecting Ontology Development in Ecology
Few ontologies in the ecological domain exist, but their development can take advantage of gained experience in other domains and from existing modeling practices in ecology. Taxon...
C. Maria Keet
101
Voted
ASPDAC
2008
ACM
122views Hardware» more  ASPDAC 2008»
15 years 2 months ago
Total power optimization combining placement, sizing and multi-Vt through slack distribution management
Power dissipation is quickly becoming one of the most important limiters in nanometer IC design for leakage increases exponentially as the technology scaling down. However, power ...
Tao Luo, David Newmark, David Z. Pan