Sciweavers

416 search results - page 30 / 84
» UbiData: Requirements and Architecture for Ubiquitous Data A...
Sort
View
88
Voted
GI
2009
Springer
14 years 7 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
CODES
2008
IEEE
14 years 11 months ago
Application specific non-volatile primary memory for embedded systems
Memory subsystems have been considered as one of the most critical components in embedded systems and furthermore, displaying increasing complexity as application requirements div...
Kwangyoon Lee, Alex Orailoglu
WMPI
2004
ACM
15 years 3 months ago
Scalable cache memory design for large-scale SMT architectures
The cache hierarchy design in existing SMT and superscalar processors is optimized for latency, but not for bandwidth. The size of the L1 data cache did not scale over the past dec...
Muhamed F. Mudawar
IBMRD
2011
112views more  IBMRD 2011»
14 years 4 months ago
Sensor Andrew: Large-scale campus-wide sensing and actuation
—We present Sensor Andrew, a multi-disciplinary campus-wide scalable sensor network that is designed to host a wide range of sensor, actuator and low-power applications. The goal...
Anthony Rowe, Mario Berges, Gaurav Bhatia, Ethan G...
ECSCW
1993
14 years 11 months ago
TOSCA Providing organisational information to CSCW applications
: Most cooperation support systems require information about the organisational context in which they are used. This is particularly required when systems are used in a large organ...
Wolfgang Prinz