Sciweavers

402 search results - page 70 / 81
» Enhancing Simulation Education with a Virtual Presentation T...
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 1 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
JCM
2008
101views more  JCM 2008»
13 years 7 months ago
WiMAX: The Innovative Broadband Wireless Access Technology
The telecommunication industry has been through disruptive times, but data networking service revenue has continued to rise. The telecom industry is expected to continue to grow as...
Abdulrahman Yarali, Saifur Rahman, Bwanga Mbula
ICCHP
2004
Springer
14 years 26 days ago
Minus-Two: Multimedia, Sound Spatialization and 3D Representation for Cognitively Impaired Children
: Multimedia and Hypermedia technologies can be successfully used in education and rehabilitation for cognitively disabled persons. In particular, storytelling has always proved su...
Thimoty Barbieri, Antonio Bianchi, Licia Sbattella
TIT
2010
146views Education» more  TIT 2010»
13 years 2 months ago
Information propagation speed in mobile and delay tolerant networks
Abstract--The goal of this paper is to increase our understanding of the fundamental performance limits of mobile and Delay Tolerant Networks (DTNs), where end-to-end multi-hop pat...
Philippe Jacquet, Bernard Mans, Georgios Rodolakis
CORR
2002
Springer
156views Education» more  CORR 2002»
13 years 7 months ago
MPICH-G2: A Grid-Enabled Implementation of the Message Passing Interface
Application development for distributed-computing ``Grids'' can benefit from tools that variously hide or enable application-level management of critical aspects of the ...
Nicholas T. Karonis, Brian R. Toonen, Ian T. Foste...