Sciweavers

508 search results - page 68 / 102
» NFS, Its Applications and Future
Sort
View
DSN
2005
IEEE
14 years 1 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
KI
2005
Springer
14 years 1 months ago
Diagnosis of Plan Execution and the Executing Agent
We discuss the application of Model-Based Diagnosis in (agent-based) planning. Here, a plan together with its executing agent is considered as a system to be diagnosed. It is assum...
Nico Roos, Cees Witteveen
ESWS
2004
Springer
14 years 1 months ago
Learning to Harvest Information for the Semantic Web
Abstract. In this paper we describe a methodology for harvesting information from large distributed repositories (e.g. large Web sites) with minimum user intervention. The methodol...
Fabio Ciravegna, Sam Chapman, Alexiei Dingli, Yori...
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 29 days ago
Evaluating Telemedicine Systems Success: A Revised Model
Broadly, telemedicine refers to the use of information and telecommunication technologies to distribute information and/or expertise necessary for healthcare service provision, co...
Paul Jen-Hwa Hu
DATE
2010
IEEE
159views Hardware» more  DATE 2010»
14 years 23 days ago
A rapid prototyping system for error-resilient multi-processor systems-on-chip
—Static and dynamic variations, which have negative impact on the reliability of microelectronic systems, increase with smaller CMOS technology. Thus, further downscaling is only...
Matthias May, Norbert Wehn, Abdelmajid Bouajila, J...