Sciweavers

7504 search results - page 1464 / 1501
» Computing with Action Potentials
Sort
View
CSREASAM
2006
13 years 11 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
EGITALY
2006
13 years 11 months ago
Easy Access to Huge 3D Models of Works of Art
Automatic shape acquisition technologies evolved rapidly in recent years, and huge mass of 3D data can be easily produced. The high accuracy of range scanning technology makes the...
Marco Callieri, Federico Ponchio, Paolo Cignoni, R...
IPCO
2004
110views Optimization» more  IPCO 2004»
13 years 11 months ago
Scheduling an Industrial Production Facility
Managing an industrial production facility requires carefully allocating limited resources, and gives rise to large, potentially complicated scheduling problems. In this paper we c...
Eyjolfur Asgeirsson, Jonathan W. Berry, Cynthia A....
USS
2004
13 years 11 months ago
Avfs: An On-Access Anti-Virus File System
Viruses and other malicious programs are an everincreasing threat to current computer systems. They can cause serious damage and consume countless hours of system administrators&#...
Yevgeniy Miretskiy, Abhijith Das, Charles P. Wrigh...
WSC
2004
13 years 11 months ago
Future of Simulation in Biotechnology Industry
In the 21st century, the Biotechnology industry has the potential to inspire a number of management tools and theories, just as the Automobile industry did in the 20th century. Th...
Prasad V. Saraph
« Prev « First page 1464 / 1501 Last » Next »