Sciweavers

128 search results - page 18 / 26
» A Proposal of XB-Method, an Idea Generation System for New S...
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
JNW
2008
182views more  JNW 2008»
13 years 7 months ago
Evaluating the Performance of Fast Handover for Hierarchical MIPv6 in Cellular Networks
Next-Generation Wireless Networks (NGWNs) present an all-IP-based architecture integrating existing cellular networks with Wireless Local Area Networks (WLANs), Wireless Metropolit...
Li Jun Zhang, Samuel Pierre
VEE
2012
ACM
322views Virtualization» more  VEE 2012»
12 years 3 months ago
Modeling virtualized applications using machine learning techniques
With the growing adoption of virtualized datacenters and cloud hosting services, the allocation and sizing of resources such as CPU, memory, and I/O bandwidth for virtual machines...
Sajib Kundu, Raju Rangaswami, Ajay Gulati, Ming Zh...
JAR
2000
97views more  JAR 2000»
13 years 7 months ago
A Deductive Database Approach to Automated Geometry Theorem Proving and Discovering
We report our effort to build a geometry deductive database, which can be used to find the fixpoint for a geometric configuration. The system can find all the properties of the con...
Shang-Ching Chou, Xiao-Shan Gao, Jing-Zhong Zhang
EDBT
2008
ACM
161views Database» more  EDBT 2008»
13 years 9 months ago
Automatic content targeting on mobile phones
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...