Sciweavers

1379 search results - page 213 / 276
» codes 2009
Sort
View
120
Voted
IEEEIAS
2009
IEEE
15 years 7 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
IEEEPACT
2009
IEEE
15 years 7 months ago
Architecture Support for Improving Bulk Memory Copying and Initialization Performance
—Bulk memory copying and initialization is one of the most ubiquitous operations performed in current computer systems by both user applications and Operating Systems. While many...
Xiaowei Jiang, Yan Solihin, Li Zhao, Ravishankar I...
101
Voted
IEEEPACT
2009
IEEE
15 years 7 months ago
Analytical Modeling of Pipeline Parallelism
Parallel programming is a requirement in the multi-core era. One of the most promising techniques to make parallel programming available for the general users is the use of parall...
Angeles G. Navarro, Rafael Asenjo, Siham Tabik, Ca...
87
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
muNet: Harnessing Multiuser Capacity in Wireless Mesh Networks
— We present muNet, a wireless mesh network design and implementation to harness the multiuser capacity of wireless channels. Traditionally, media access control is designed to s...
Li Li, Richard Alimi, Ramachandran Ramjee, Harish ...
IPPS
2009
IEEE
15 years 7 months ago
GenWrapper: A generic wrapper for running legacy applications on desktop grids
Desktop Grids represent an alternative trend in Grid computing using the same software infrastructure as Volunteer Computing projects, such as BOINC. Applications to be deployed o...
Csaba Attila Marosi, Zoltán Balaton, P&eacu...