Sciweavers

6300 search results - page 1204 / 1260
» We have it easy, but do we have it right
Sort
View
110
Voted
JSSPP
2009
Springer
15 years 7 months ago
Modeling Parallel System Workloads with Temporal Locality
In parallel systems, similar jobs tend to arrive within bursty periods. This fact leads to the existence of the locality phenomenon, a persistent similarity between nearby jobs, in...
Tran Ngoc Minh, Lex Wolters
RAID
2009
Springer
15 years 7 months ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen
93
Voted
SMA
2009
ACM
117views Solid Modeling» more  SMA 2009»
15 years 7 months ago
Discrete physics using metrized chains
Over the last fifty years, there have been numerous efforts to develop from first principles a comprehensive discrete formulation of geometric physics, including Whitney’s ge...
Antonio DiCarlo, Franco Milicchio, Alberto Paoluzz...
ACSAC
2008
IEEE
15 years 7 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
90
Voted
CLUSTER
2008
IEEE
15 years 7 months ago
Reliable adaptable Network RAM
Abstract—We present reliability solutions for adaptable Network RAM systems running on general-purpose clusters. Network RAM allows nodes with over-committed memory to swap pages...
Tia Newhall, Daniel Amato, Alexandr Pshenichkin
« Prev « First page 1204 / 1260 Last » Next »