Sciweavers

669 search results - page 32 / 134
» critical 2005
Sort
View
GLVLSI
2005
IEEE
152views VLSI» more  GLVLSI 2005»
15 years 3 months ago
Increasing design space of the instruction queue with tag coding
The instruction queue is a critical component and performance bottleneck in superscalar microprocessors. Conventional designs use physical register identifiers to wake up instruct...
Junwei Zhou, Andrew Mason
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
15 years 3 months ago
Elephant: Network Intrusion Detection Systems that Don't Forget
Modern Network Intrusion Detection Systems (NIDSs) maintain state that helps them accurately detect attacks. Because most NIDSs are signature-based, it is critical to update their...
Michael G. Merideth, Priya Narasimhan
HICSS
2005
IEEE
129views Biometrics» more  HICSS 2005»
15 years 3 months ago
Position Statement: Methodology to Support Dependable Survivable Cyber-Secure Infrastructures
Information systems now form the backbone of nearly every government and private system. Increasingly these systems are networked together allowing for distributed operations, sha...
Frederick T. Sheldon, Stephen Gordon Batsell, Stac...
ICDCS
2005
IEEE
15 years 3 months ago
On the Impact of Replica Placement to the Reliability of Distributed Brick Storage Systems
Data reliability of distributed brick storage systems critically depends on the replica placement policy, and the two governing forces are repair speed and sensitivity to multiple...
Qiao Lian, Wei Chen, Zheng Zhang
ICDE
2005
IEEE
108views Database» more  ICDE 2005»
15 years 3 months ago
Robust Identification of Fuzzy Duplicates
Detecting and eliminating fuzzy duplicates is a critical data cleaning task that is required by many applications. Fuzzy duplicates are multiple seemingly distinct tuples which re...
Surajit Chaudhuri, Venkatesh Ganti, Rajeev Motwani