Sciweavers

32 search results - page 6 / 7
» Automatic run-time selection of power policies for operating...
Sort
View
ISM
2008
IEEE
273views Multimedia» more  ISM 2008»
13 years 7 months ago
Understanding Data-Driven Decision Support Systems
It is important for managers and Information Technology professionals to understand data-driven decision support systems and how such systems can provide business intelligence and ...
Daniel J. Power
ACSAC
2005
IEEE
14 years 1 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson
JBI
2002
105views Bioinformatics» more  JBI 2002»
13 years 7 months ago
Information extraction for enhanced access to disease outbreak reports
Document search is generally based on individual terms in the document. However, for collections within limited domains it is possible to provide more powerful access tools. This ...
Ralph Grishman, Silja Huttunen, Roman Yangarber
OOPSLA
2000
Springer
13 years 11 months ago
Application isolation in the JavaTM Virtual Machine
To date, systems offering multitasking for the JavaTM programming language either use one process or one class loader for each application. Both approaches are unsatisfactory. Usi...
Grzegorz Czajkowski
USENIX
2004
13 years 9 months ago
REX: Secure, Extensible Remote Execution
The ubiquitous SSH package has demonstrated the importance of secure remote login and execution. As remote execution tools grow in popularity, users require new features and exten...
Michael Kaminsky, Eric Peterson, Daniel B. Giffin,...