Sciweavers

422 search results - page 73 / 85
» Pattern computation in neural communication systems
Sort
View
LCPC
2007
Springer
14 years 1 months ago
Evaluation of RDMA Opportunities in an Object-Oriented DSM
Remote Direct Memory Access (RDMA) is a technology to update a remote machine’s memory without intervention at the receiver side. We evaluate where RDMA can be usefully applied a...
Ronald Veldema, Michael Philippsen
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 11 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
CHI
2006
ACM
14 years 8 months ago
Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed
This paper explores the relationship between display of feedback (public vs. private) by a computer system and the basis for evaluation (present vs. absent) of that feedback. We e...
Erica Robles, Abhay Sukumaran, Kathryn Rickertsen,...
IRI
2005
IEEE
14 years 1 months ago
Data-knowledge-context: an application model for collaborative work
For many years, researchers and software developers have been seeking to develop systems and applications to enable efficient and effective group work and organizational memory. ...
Lee A. Iverson
CGI
2006
IEEE
14 years 1 months ago
Providing Full Awareness to Distributed Virtual Environments Based on Peer-to-Peer Architectures
In recent years, large scale distributed virtual environments (DVEs) have become a major trend in distributed applications, mainly due to the enormous popularity of multiplayer onl...
Pedro Morillo, W. Moncho, Juan M. Orduña, J...