Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Abstract: This paper presents an application program interface (API) that enables applications to use applicationdefined scheduling algorithms in a way compatible with the scheduli...
Detection of interactions among data items constitutes an essential part of knowledge discovery. The cascade model is a rule induction methodology using levelwise expansion of a la...
An emerging approach to multi-device application development developers to build an abstract semantic model that is translated into specific implementations for web browsers, PDAs...
Yves Gaeremynck, Lawrence D. Bergman, Tessa A. Lau
A number of problems are well suited for volumetric representation for both simulation and storage, however, the large amount of data that needs to be processed and rendered with ...
Shigeru Muraki, Eric B. Lum, Kwan-Liu Ma, Masato O...