Sciweavers

2503 search results - page 438 / 501
» Building Computer Network Attacks
Sort
View
ICDCSW
2003
IEEE
14 years 3 months ago
Studying the Use of Handhelds to Control Smart Appliances
Abstract— Today’s complex appliances are plagued by difficultto-use interfaces. In many cases, consumers use only a few of the many features on their appliances because the mor...
Jeffrey Nichols, Brad A. Myers
IEEEAMS
2003
IEEE
14 years 3 months ago
Kinesthetics eXtreme: An External Infrastructure for Monitoring Distributed Legacy Systems
Autonomic computing – self-configuring, self-healing, self-optimizing applications, systems and networks – is widely believed to be a promising solution to everincreasing syst...
Gail E. Kaiser, Janak J. Parekh, Philip Gross, Giu...
SC
2000
ACM
14 years 2 months ago
Expressing and Enforcing Distributed Resource Sharing Agreements
Advances in computing and networking technology, and an explosion in information sources has resulted in a growing number of distributed systems getting constructed out of resourc...
Tao Zhao, Vijay Karamcheti
ICCV
2009
IEEE
6637views Computer Vision» more  ICCV 2009»
15 years 3 months ago
A Markov Clustering Topic Model for Mining Behaviour in Video
This paper addresses the problem of fully automated mining of public space video data. A novel Markov Clustering Topic Model (MCTM) is introduced which builds on existing Dynami...
Timothy Hospedales, Shaogang Gong, Tao Xiang
IPPS
2007
IEEE
14 years 4 months ago
Speculative Flow Control for High-Radix Datacenter Interconnect Routers
High-radix switches are desirable building blocks for large computer interconnection networks, because they are more suitable to convert chip I/O bandwidth into low latency and lo...
Cyriel Minkenberg, Mitchell Gusat