Sciweavers

139 search results - page 13 / 28
» Modeling the invisible college
Sort
View
CSL
2004
Springer
14 years 3 months ago
Fixed Points of Type Constructors and Primitive Recursion
Abstract. For nested or heterogeneous datatypes, terminating recursion schemes considered so far have been instances of iteration, excluding efficient definitions of fixed-point ...
Andreas Abel, Ralph Matthes
IJCSA
2008
131views more  IJCSA 2008»
13 years 9 months ago
On Ubiquitous Integrated Computing
: Ubiquitous integrated computing makes possible new workflow processes and business models which can meet the challenges from the fast growing digital convergence. An integrated i...
Kari Anne Haaland Thorsen, Chunming Rong
CN
2007
179views more  CN 2007»
13 years 9 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
MOBISYS
2006
ACM
14 years 9 months ago
Building realistic mobility models from coarse-grained traces
In this paper we present a trace-driven framework capable of building realistic mobility models for the simulation studies of mobile systems. With the goal of realism, this framew...
Jungkeun Yoon, Brian D. Noble, Mingyan Liu, Minkyo...
JITE
2006
106views more  JITE 2006»
13 years 9 months ago
The Information Technology Model Curriculum
The last twenty years has seen the development of demand for a new type of computing professional, which has resulted in the emergence of the academic discipline of Information Te...
Joseph J. Ekstrom, Sandra Gorka, Reza Kamali, Eydi...