Sciweavers

158 search results - page 19 / 32
» Effective Choice and Boundedness Principles in Computable An...
Sort
View
IJDE
2006
95views more  IJDE 2006»
13 years 8 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
ICCS
2007
Springer
14 years 2 months ago
Optimizing Surface Triangulation Via Near Isometry with Reference Meshes
Optimization of the mesh quality of surface triangulation is critical for advanced numerical simulations and is challenging under the constraints of error minimization and density ...
Xiangmin Jiao, Narasimha R. Bayyana, Hongyuan Zha
ICC
2009
IEEE
190views Communications» more  ICC 2009»
14 years 3 months ago
Decomposition for Low-Complexity Near-Optimal Routing in Multi-Hop Wireless Networks
Abstract—Network flow models serve as a popular mathematical framework for the analysis and optimization of Multi-hop Wireless Networks. They also serve to provide the understan...
Vinay Kolar, Nael B. Abu-Ghazaleh, Petri Mäh&...
SOUPS
2005
ACM
14 years 2 months ago
Attacking information visualization system usability overloading and deceiving the human
Information visualization is an effective way to easily comprehend large amounts of data. For such systems to be truly effective, the information visualization designer must be aw...
Gregory J. Conti, Mustaque Ahamad, John T. Stasko
IAJIT
2011
13 years 3 months ago
Evaluation for diaphragm's deflection for touch mode MEMS pressure sensors
: In this paper, an analytical and simulation solution for touch mode Micro-electromechanical systems pressure sensor operating in harsh environment is proposed. The principle of t...
Yadollah Hezarjaribi, Mohd Hamidon, Roslina Mohd S...