Sciweavers

1332 search results - page 201 / 267
» A generative programming approach to developing pervasive co...
Sort
View
USS
2004
13 years 10 months ago
Very Fast Containment of Scanning Worms
Computer worms -- malicious, self-propagating programs -- represent a significant threat to large networks. One possible defense, containment, seeks to limit a worm's spread ...
Nicholas Weaver, Stuart Staniford, Vern Paxson
ESCIENCE
2007
IEEE
14 years 3 months ago
Decentralised Resource Discovery Service for Large Scale Federated Grids
Efficient Resource discovery mechanism is one of the fundamental requirement for Grid computing systems, as it aids in resource management and scheduling of applications. Resourc...
Rajiv Ranjan, Lipo Chan, Aaron Harwood, Shanika Ka...
IUI
2000
ACM
14 years 1 months ago
Using annotated video as an information retrieval interface
The ability to deliver appropriate information to learners at the most appropriate time is an essential component of good instruction. In the best learning environments, this info...
Andrew S. Gordon
WIS
2004
13 years 10 months ago
A Wireless Data Stream Mining Model
The sensor networks, web click stream and astronomical applications generate a continuous flow of data streams. Most likely data streams are generated in a wireless environment. Th...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
CC
2008
Springer
123views System Software» more  CC 2008»
13 years 11 months ago
Automatic Transformation of Bit-Level C Code to Support Multiple Equivalent Data Layouts
Portable low-level C programs must often support multiple equivalent in-memory layouts of data, due to the byte or bit order of the compiler, architecture, or external data formats...
Marius Nita, Dan Grossman