Sciweavers

2503 search results - page 491 / 501
» Building Computer Network Attacks
Sort
View
PDIS
1994
IEEE
13 years 12 months ago
Achieving Transaction Scaleup on Unix
Constructing scalable high-performance applications on commodity hardware running the Unix operating system is a problem that must be addressed in several application domains. We ...
Marie-Anne Neimat, Donovan A. Schneider
CHI
1993
ACM
13 years 12 months ago
Exploring the applications of user-expertise assessment for intelligent interfaces
An adaptive user interface relies, to a large extent, upon an adequate user model (e.g., a representationof user-expertise). However, building a user model may be a tedious and ti...
Michel Desmarais, Jiming Liu
CGI
2003
IEEE
13 years 11 months ago
Consistent Visualization and Querying of GIS Databases by a Location-Aware Mobile Agent
Location-aware mobile users need to access, query, and visualize, geographic information in a wide variety of applications including tourism, navigation, environmental management,...
Suresh K. Lodha, Nikolai M. Faaland, Grant Wong, A...
WMCSA
2008
IEEE
14 years 2 months ago
Low-bandwidth VM migration via opportunistic replay
Virtual machine (VM) migration has been proposed as a building block for mobile computing. An important challenge for VM migration is to optimize the transfer of large amounts of ...
Ajay Surie, H. Andrés Lagar-Cavilla, Eyal d...
GI
2007
Springer
14 years 1 months ago
Semantic Web Technologies for Power Grid Management
: Utility companies worldwide are facing a multitude of new challenges, which can not be met with the historically grown, monolithic IT systems currently in use. Service oriented a...
Mathias Uslar, Nikolai Dahlem