Sciweavers

3223 search results - page 636 / 645
» Can graduating students design software systems
Sort
View
CCS
2007
ACM
14 years 2 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
EUC
2005
Springer
14 years 1 months ago
Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety
In USA, 2002, approximately 3.2 million intersection-related crashes occurred, corresponding to 50 percent of all reported crashes. In Japan, more than 58 percent of all traffic cr...
Flora Dilys Salim, Shonali Krishnaswamy, Seng Wai ...
EUROPAR
2005
Springer
14 years 1 months ago
Hierarchical Scheduling for Moldable Tasks
The model of moldable task (MT) was introduced some years ago and has been proved to be an efficient way for implementing parallel applications. It considers a target application ...
Pierre-François Dutot
ACSC
2003
IEEE
14 years 1 months ago
Extensible Job Managers for Grid Computing
Grid computing is becoming an important framework for enabling applications to utilize widely distributed collections of computational and data resources, however current grid sof...
Paul D. Coddington, Lici Lu, Darren Webb, Andrew L...
CSCWD
2001
Springer
14 years 26 days ago
Update Algorithms for the Sketch Data Model
The authors have developed a new approach to database interoperability using the sketch data model. That technique has now been used in a number of applications, but an important ...
Michael Johnson, Robert D. Rosebrugh