Sciweavers

13895 search results - page 2658 / 2779
» Exploring
Sort
View
COMCOM
2007
82views more  COMCOM 2007»
13 years 10 months ago
On application-level load balancing in FastReplica
— In the paper, we consider the problem of distributing large-size content to a fixed set of nodes. In contrast with the most existing end-system solutions to this problem, Fast...
Jangwon Lee, Gustavo de Veciana
ISF
2008
210views more  ISF 2008»
13 years 10 months ago
Affective e-Learning in residential and pervasive computing environments
This article examines how emerging pervasive computing and affective computing technologies might enhance the adoption of ICT in e-Learning which takes place in the home and wider ...
Liping Shen, Victor Callaghan, Ruimin Shen
IJDE
2006
95views more  IJDE 2006»
13 years 10 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
ISI
2008
Springer
13 years 10 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
COMPUTER
2007
135views more  COMPUTER 2007»
13 years 10 months ago
A Language for Human Action
and therefore should be implemented outside the sensory-motor system. This way, meaning for a concept amounts to the content of a symbolic expression, a definition of the concept ...
Gutemberg Guerra-Filho, Yiannis Aloimonos
« Prev « First page 2658 / 2779 Last » Next »