Sciweavers

2844 search results - page 529 / 569
» A Comparison of Partitioning Operating Systems for Integrate...
Sort
View
CSREASAM
2009
15 years 4 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton
FGR
2008
IEEE
165views Biometrics» more  FGR 2008»
15 years 4 months ago
The significance of facial features for automatic sign language recognition
Although facial features are considered to be essential for humans to understand sign language, no prior research work has yet examined their significance for automatic sign langu...
Ulrich von Agris, Moritz Knorr, Karl-Friedrich Kra...
ADHOC
2007
133views more  ADHOC 2007»
15 years 4 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
ADHOC
2007
104views more  ADHOC 2007»
15 years 4 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
SIGMETRICS
2008
ACM
159views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Weighted fair sharing for dynamic virtual clusters
In a shared server infrastructure, a scheduler controls how quantities of resources are shared over time in a fair manner across multiple, competing consumers. It should support w...
Laura E. Grit, Jeffrey S. Chase