Sciweavers

1882 search results - page 87 / 377
» A User Interaction Model for NFC Enabled Applications
Sort
View
AINA
2007
IEEE
15 years 10 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
112
Voted
ECRTS
2002
IEEE
15 years 9 months ago
POSIX-Compatible Application-Defined Scheduling in MaRTE OS
Abstract: This paper presents an application program interface (API) that enables applications to use applicationdefined scheduling algorithms in a way compatible with the scheduli...
Mario Aldea Rivas, Michael González Harbour
PAKDD
2000
ACM
128views Data Mining» more  PAKDD 2000»
15 years 7 months ago
Efficient Detection of Local Interactions in the Cascade Model
Detection of interactions among data items constitutes an essential part of knowledge discovery. The cascade model is a rule induction methodology using levelwise expansion of a la...
Takashi Okada
IUI
2003
ACM
15 years 9 months ago
MORE for less: model recovery from visual interfaces for multi-device application design
An emerging approach to multi-device application development developers to build an abstract semantic model that is translated into specific implementations for web browsers, PDAs...
Yves Gaeremynck, Lawrence D. Bergman, Tessa A. Lau
PVG
2003
IEEE
165views Visualization» more  PVG 2003»
15 years 9 months ago
A PC Cluster System for Simultaneous Interactive Volumetric Modeling and Visualization
A number of problems are well suited for volumetric representation for both simulation and storage, however, the large amount of data that needs to be processed and rendered with ...
Shigeru Muraki, Eric B. Lum, Kwan-Liu Ma, Masato O...