Sciweavers

3984 search results - page 271 / 797
» Using linked data for systems management
Sort
View
209
Voted
BMCBI
2011
14 years 12 months ago
Bio: : Phylo - phyloinformatic analysis using Perl
Background: Phyloinformatic analyses involve large amounts of data and metadata of complex structure. Collecting, processing, analyzing, visualizing and summarizing these data and...
Rutger A. Vos, Jason Caravas, Klaas Hartmann, Mark...
ICCD
2007
IEEE
145views Hardware» more  ICCD 2007»
16 years 1 months ago
Effective Dynamic Thermal Management for MPEG-4 decoding
This paper proposes Dynamic Thermal Management (DTM) based on a dynamic voltage and frequency scaling (DVFS) technique for MPEG-4 decoding to guarantee thermal safety while mainta...
Inchoon Yeo, Heung Ki Lee, Eun Jung Kim, Ki Hwan Y...
149
Voted
DSOM
2003
Springer
15 years 10 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
DOLAP
1998
ACM
15 years 9 months ago
Methodological Framework for Data Warehouse Design
Though designing a data warehouse requires techniques completely different from those adopted for operational systems, no significant effort has been made so far to develop a comp...
Matteo Golfarelli, Stefano Rizzi
119
Voted
DSN
2005
IEEE
15 years 10 months ago
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
This paper describes an experimental approach to determine the correlation between port scans and attacks. Discussions in the security community often state that port scans should...
Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, M...