Sciweavers

1039 search results - page 140 / 208
» networks 1998
Sort
View
SCCC
1998
IEEE
15 years 3 months ago
Parallel Generation of Inverted Files for Distributed Text Collections
We present a scalable algorithm for the parallel computation of inverted files for large text collections. The algorithm takes into account an environment of a high bandwidth netw...
Berthier A. Ribeiro-Neto, Joao Paulo Kitajima, Gon...
ASPLOS
1998
ACM
15 years 3 months ago
Overlapping Execution with Transfer Using Non-Strict Execution for Mobile Programs
In order to execute a program on a remote computer, it must first be transferred over a network. This transmission incurs the overhead of network latency before execution can beg...
Chandra Krintz, Brad Calder, Han Bok Lee, Benjamin...
NIPS
2001
15 years 1 months ago
A theory of neural integration in the head-direction system
Integration in the head-direction system is a computation by which horizontal angular head velocity signals from the vestibular nuclei are integrated to yield a neural representat...
Richard H. R. Hahnloser, Xiaohui Xie, H. Sebastian...
71
Voted
LISA
1998
15 years 1 months ago
A Visual Approach for Monitoring Logs
Analyzing and monitoring logs that portray system, user, and network activity is essential to meet the requirements of high security and optimal resource availability. While most ...
Luc Girardin, Dominique Brodbeck
90
Voted
CLEIEJ
1998
134views more  CLEIEJ 1998»
14 years 11 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You