Sciweavers

3686 search results - page 664 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
ANCS
2006
ACM
14 years 1 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
INTERACT
2007
13 years 9 months ago
Towards Applicable 3D User Interfaces for Everyday Working Environments
Desktop environments have proven to be a powerful user interface and are used as the de facto standard human-computer interaction paradigm for over 40 years. However, there is a ri...
Frank Steinicke, Timo Ropinski, Gerd Bruder, Klaus...
IJPP
2002
107views more  IJPP 2002»
13 years 7 months ago
Efficiently Adapting Java Binaries in Limited Memory Contexts
This paper presents a compilation framework that allows executable code to be shared across different Java Virtual Machine (JVM) instances. All fully compliant JVMs that target se...
Pramod G. Joisha, Samuel P. Midkiff, Mauricio J. S...
TVCG
2008
93views more  TVCG 2008»
13 years 7 months ago
Interactive, Internet Delivery of Visualization via Structured Prerendered Multiresolution Imagery
Abstract-We present a novel approach for latency-tolerant remote visualization and rendering where client-side frame rate display performance is independent of source dataset size,...
Jerry Chen, Ilmi Yoon, Wes Bethel
ECRTS
2005
IEEE
14 years 1 months ago
Cache Contents Selection for Statically-Locked Instruction Caches: An Algorithm Comparison
Cache memories have been extensively used to bridge the gap between high speed processors and relatively slower main memories. However, they are sources of predictability problems...
Antonio Martí Campoy, Isabelle Puaut, Angel...