Sciweavers

17082 search results - page 3288 / 3417
» Abstractions for Mobile Computation
Sort
View
GI
2010
Springer
15 years 2 months ago
Is it Possible to Interact with a Handheld Device While Holding it in Both Hands?
Abstract: Intuitiveness, attractiveness and efficiency are in general important characteristics of high quality User Interfaces (UI). In the case of a Mass Casualty Incident (MCI)...
Tayfur Coskun, Eva Artinger, Simon Nestler, Amal B...
ICS
2010
Tsinghua U.
15 years 2 months ago
Decomposable and responsive power models for multicore processors using performance counters
Abstract—Power modeling based on performance monitoring counters (PMCs) has attracted the interest of many researchers since it become a quick approach to understand and analyse ...
Ramon Bertran, Marc González, Xavier Martor...
MIDDLEWARE
2010
Springer
15 years 2 months ago
FaReCast: Fast, Reliable Application Layer Multicast for Flash Dissemination
Abstract. To disseminate messages from a single source to a large number of targeted receivers, a natural approach is the tree-based application layer multicast (ALM). However, in ...
Kyungbaek Kim, Sharad Mehrotra, Nalini Venkatasubr...
RAID
2010
Springer
15 years 2 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
RAID
2010
Springer
15 years 2 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
« Prev « First page 3288 / 3417 Last » Next »