Sciweavers

3747 search results - page 174 / 750
» Active Operations on Collections
Sort
View
IJDE
2006
95views more  IJDE 2006»
13 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
CHI
2007
ACM
14 years 1 months ago
An exploration of web-based monitoring: implications for design
Monitoring occurs when users return to previously viewed web pages to view new or updated information. While tools exist to support web-based monitoring, we know little about the ...
Melanie Kellar, Carolyn R. Watters, Kori M. Inkpen
CN
2007
111views more  CN 2007»
13 years 9 months ago
Quantile sampling for practical delay monitoring in Internet backbone networks
Point-to-point delay is an important network performance measure as it captures service degradations caused by various events. We study how to measure and report delay in a concis...
Baek-Young Choi, Sue B. Moon, Rene L. Cruz, Zhi-Li...
SOSP
1997
ACM
13 years 10 months ago
Automated Hoarding for Mobile Computers
A common problem facing mobile computing is disconnected operation, or computing in the absence of a network. Hoarding eases disconnected operation by selecting a subset of the us...
Geoffrey H. Kuenning, Gerald J. Popek
IJMMS
2006
82views more  IJMMS 2006»
13 years 9 months ago
Scale transformations and information presentation in supervisory control
For human operators supervising a complex system it is crucial to have a powerful and flexible information presentation system. In order to reduce the cognitive load operators oft...
Johannes Petersen, Michael May