Sciweavers

1541 search results - page 288 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
SUTC
2006
IEEE
15 years 6 months ago
Multi-ontology Based Multimedia Annotation for Domain-specific Information Retrieval
Recent advances in computer power, network bandwidth, information storage, and multimedia/signal processing techniques have led to a proliferation of multimedia data. As a result,...
Aijuan Dong, Honglin Li
97
Voted
CCS
2004
ACM
15 years 5 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
EUROPAR
2007
Springer
15 years 6 months ago
Esodyp+: Prefetching in the Jackal Software DSM
Abstract. Prefetching transfers a data item in advance from its storage location to its usage location so that communication is hidden and does not delay computation. We present a ...
Michael Klemm, Jean Christophe Beyler, Ronny T. La...
WOTUG
2008
15 years 1 months ago
Process-Oriented Collective Operations
Abstract. Distributing process-oriented programs across a cluster of machines requires careful attention to the effects of network latency. The MPI standard, widely used for cluste...
John Markus Bjørndalen, Adam T. Sampson
AAAI
1996
15 years 1 months ago
Computing Optimal Policies for Partially Observable Decision Processes Using Compact Representations
: Partially-observable Markov decision processes provide a very general model for decision-theoretic planning problems, allowing the trade-offs between various courses of actions t...
Craig Boutilier, David Poole