Sciweavers

536 search results - page 31 / 108
» Deconstructing process isolation
Sort
View
MICCAI
2009
Springer
14 years 5 months ago
Constrained Data Decomposition and Regression for Analyzing Healthy Aging from Fiber Tract Diffusion Properties
Abstract. It has been shown that brain structures in normal aging undergo significant changes attributed to neurodevelopmental and neurodegeneration processes as a lifelong, dynami...
Sylvain Gouttard, Marcel Prastawa, Elizabeth Bulli...
GLOBECOM
2007
IEEE
14 years 3 months ago
On the Expected Connection Lifetime and Stochastic Resilience of Wireless Multi-Hop Networks
—To understand how node mobility and Byzantine node failures affect connectivity of wireless multi-hop networks, this paper investigates resilience of geometric random graphs to ...
Fei Xing, Wenye Wang
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
14 years 1 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
HOTOS
2009
IEEE
14 years 15 days ago
Operating Systems Should Provide Transactions
Operating systems can efficiently provide system transactions to user applications, in which user-level processes can execute a series of system calls atomically and in isolation ...
Donald E. Porter, Emmett Witchel
ICASSP
2010
IEEE
13 years 8 months ago
An alternate approach to adaptive beamforming using SRP-PHAT
An important application for microphone arrays is to extract highquality output from a single wideband source in multi-source and adverse environments. Methods based on blind-sour...
Avram Levi, Harvey F. Silverman