Sciweavers

3116 search results - page 552 / 624
» Design and implementation of network puzzles
Sort
View
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 9 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
126
Voted
IPPS
2005
IEEE
15 years 9 months ago
The SDVM - An Approach for Future Adaptive Computer Clusters
The Self Distributing Virtual Machine (SDVM) is a parallel computing machine which consists of a cluster of customary computers. The participating machines may have different comp...
Jan Haase, Frank Eschmann, Klaus Waldschmidt
IPPS
2005
IEEE
15 years 9 months ago
Stream PRAM
Parallel random access memory, or PRAM, is a now venerable model of parallel computation that that still retains its usefulness for the design and analysis of parallel algorithms....
Darrell R. Ulm, Michael Scherger
127
Voted
ISSRE
2005
IEEE
15 years 9 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
149
Voted
MMM
2005
Springer
148views Multimedia» more  MMM 2005»
15 years 9 months ago
Paving the Last Mile for Multi-Channel Multimedia Presentation Generation
Users of multimedia applications today are equipped with a variety of different (mobile) devices that each come with different operating systems, memory and CPU capabilities, netw...
Ansgar Scherp, Susanne Boll