Sciweavers

5756 search results - page 134 / 1152
» Describing Objects by their Attributes
Sort
View
LISA
2008
14 years 12 hour ago
Topnet: A Network-aware top(1)
System administrators regularly use the top utility for understanding the resource consumption of the processes running on UNIX computers. Top provides an accurate and real-time d...
Antonis Theocharides, Demetres Antoniades, Michali...
CIMCA
2005
IEEE
13 years 11 months ago
Customised Customer Support Using a Soft Computing Approach
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...
AVI
2006
13 years 11 months ago
A taxonomy of ambient information systems: four patterns of design
Researchers have explored the design of ambient information systems across a wide range of physical and screen-based media. This work has yielded rich examples of design approache...
Zachary Pousman, John T. Stasko
IADIS
2004
13 years 11 months ago
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI
We have designed and deployed a system that uses X.509 public-key certificates (PKC) and attribute certificates (AC) for access control. This includes an authorization service for...
Diana Berbecaru, Antonio Lioy
WCET
2007
13 years 10 months ago
Finding DU-Paths for Testing of Multi-Tasking Real-Time Systems using WCET Analysis
Memory corruption is one of the most common software failures. For sequential software and multitasking software with synchronized data accesses, it has been shown that program fa...
Daniel Sundmark, Anders Pettersson, Christer Sandb...