Sciweavers

811 search results - page 134 / 163
» Modeling and Virtualization for Secure Computing Environment...
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
Towards A Better Understanding of Workload Dynamics on Data-Intensive Clusters and Grids
This paper presents a comprehensive statistical analysis of workloads collected on data-intensive clusters and Grids. The analysis is conducted at different levels, including Virt...
Hui Li, Lex Wolters
ACMACE
2006
ACM
14 years 2 months ago
From driving to expressive music performance: ensuring tempo smoothness
This paper focuses on the mapping strategies in the interface design for the Expression Synthesis Project (ESP). The goal of ESP is to use the metaphor of driving to allow non-exp...
Jie Liu, Elaine Chew, Alexandre R. J. Franç...
HCI
2009
13 years 6 months ago
Adaptive Learning via Social Cognitive Theory and Digital Cultural Ecosystems
This paper will look at the human predisposition to oral tradition and its effectiveness as a learning tool to convey mission-critical information. After exploring the effectivenes...
Joseph Juhnke, Adam R. Kallish
AINA
2007
IEEE
14 years 3 months ago
How to Study Wireless Mesh Networks: A hybrid Testbed Approach
— Simulation is the most famous way to study wireless an mobile networks since they offer a convenient combination of flexibility and controllability. However, their largest dis...
Alexander Zimmermann, Mesut Günes, Martin Wen...
RAID
2004
Springer
14 years 2 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee