Sciweavers

8636 search results - page 1612 / 1728
» How Developers Copy
Sort
View
114
Voted
IPCCC
2006
IEEE
15 years 8 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
109
Voted
IPPS
2006
IEEE
15 years 8 months ago
Dynamic multi phase scheduling for heterogeneous clusters
Distributed computing systems are a viable and less expensive alternative to parallel computers. However, concurrent programming methods in distributed systems have not been studi...
Florina M. Ciorba, Theodore Andronikos, Ioannis Ri...
ISM
2006
IEEE
103views Multimedia» more  ISM 2006»
15 years 8 months ago
A Study of Collaborative Dancing in Tele-immersive Environments
We first present the tele-immersive environments developed jointly by University of Illinois at Urbana-Champaign and University of California at Berkeley. The environment feature...
Zhenyu Yang, Bin Yu, Wanmin Wu, Klara Nahrstedt, R...
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 8 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
WSE
2006
IEEE
15 years 8 months ago
Modeling Request Routing in Web Applications
For web applications, determining how requests from a web page are routed through server components can be time-consuming and error-prone due to the complex set of rules and mecha...
Minmin Han, Christine Hofmeister
« Prev « First page 1612 / 1728 Last » Next »