Sciweavers

7811 search results - page 1251 / 1563
» computing 2004
Sort
View
IMC
2004
ACM
15 years 10 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
ISLPED
2004
ACM
159views Hardware» more  ISLPED 2004»
15 years 10 months ago
Dynamic voltage scaling for systemwide energy minimization in real-time embedded systems
Traditionally, dynamic voltage scaling (DVS) techniques have focused on minimizing the processorenergy consumption as opposed to the entire system energy consumption. The slowdown...
Ravindra Jejurikar, Rajesh K. Gupta
ISLPED
2004
ACM
119views Hardware» more  ISLPED 2004»
15 years 10 months ago
Application-level prediction of battery dissipation
Mobile, battery-powered devices such as personal digital assistants and web-enabled mobile phones have successfully emerged as new access points to the world’s digital infrastru...
Chandra Krintz, Ye Wen, Richard Wolski
ISPD
2004
ACM
126views Hardware» more  ISPD 2004»
15 years 10 months ago
Recursive bisection based mixed block placement
Many current designs contain a large number of standard cells intermixed with larger macro blocks. The range of size in these “mixed block” designs complicates the placement p...
Ateen Khatkhate, Chen Li 0004, Ameya R. Agnihotri,...
IUI
2004
ACM
15 years 10 months ago
Exploiting emotions to disambiguate dialogue acts
This paper describes an attempt to reveal the user’s intention from dialogue acts, thereby improving the effectiveness of natural interfaces to pedagogical agents. It focuses o...
Wauter Bosma, Elisabeth André
« Prev « First page 1251 / 1563 Last » Next »