Sciweavers

6660 search results - page 1314 / 1332
» Data Analysis for Query Processing
Sort
View
VEE
2009
ACM
146views Virtualization» more  VEE 2009»
14 years 4 months ago
Achieving 10 Gb/s using safe and transparent network interface virtualization
: © Achieving 10 Gb/s using Safe and Transparent Network Interface Virtualization Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turner, Alan L. Cox, Scott Rixner HP Laboratories H...
Kaushik Kumar Ram, Jose Renato Santos, Yoshio Turn...
CCS
2009
ACM
14 years 4 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
INFOCOM
2009
IEEE
14 years 4 months ago
Distributed Opportunistic Scheduling With Two-Level Channel Probing
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simpl...
P. S. Chandrashekhar Thejaswi, Junshan Zhang, Man-...
CIKM
2009
Springer
14 years 4 months ago
Multivariate classification of urine metabolome profiles for breast cancer diagnosis
Background: Diagnosis techniques using urine are non-invasive, inexpensive, and easy to perform in clinical settings. The metabolites in urine, as the end products of cellular pro...
Younghoon Kim, Imhoi Koo, Byung Hwa Jung, Bong Chu...
TAMC
2009
Springer
14 years 4 months ago
The Extended Turing Model as Contextual Tool
Computability concerns information with a causal – typically algorithmic – structure. As such, it provides a schematic analysis of many naturally occurring situations. We look ...
S. Barry Cooper
« Prev « First page 1314 / 1332 Last » Next »