Sciweavers

20813 search results - page 4110 / 4163
» Introduction to Computer Networking
Sort
View
RAID
2004
Springer
14 years 3 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
SAMOS
2004
Springer
14 years 3 months ago
Scalable Instruction-Level Parallelism.
This paper presents a model for instruction-level distributed computing that allows the implementation of scalable chip multiprocessors. Based on explicit microthreading it serves ...
Chris R. Jesshope
SEM
2004
Springer
14 years 3 months ago
Service Discovery Protocol Interoperability in the Mobile Environment
The emergence of portable computers and wireless technologies has introduced new challenges for middleware. Mobility brings new requirements and is becoming a key characteristic. M...
Yérom-David Bromberg, Valérie Issarn...
SEMWEB
2004
Springer
14 years 3 months ago
An Initial Investigation into Querying an Untrustworthy and Inconsistent Web
The Semantic Web is bound to be untrustworthy and inconsistent. In this paper, we present an initial approach for obtaining useful information in such an environment. In particular...
Yuanbo Guo, Jeff Heflin
MIR
2010
ACM
206views Multimedia» more  MIR 2010»
14 years 3 months ago
An investigation into the relationship between semantic and content based similarity using LIDC
There is considerable research in the field of content-based medical image retrieval; however, few of the current systems investigate the relationship between the radiologists’...
Robert Kim, Grace Dasovich, Runa Bhaumik, Richard ...
« Prev « First page 4110 / 4163 Last » Next »