Sciweavers

2433 search results - page 415 / 487
» Power laws in software
Sort
View
TDSC
2010
172views more  TDSC 2010»
13 years 4 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
VLUDS
2010
184views Visualization» more  VLUDS 2010»
13 years 4 months ago
Advanced Visualization and Interaction Techniques for Large High-Resolution Displays
Large high-resolution displays combine the images of multiple smaller display devices to form one large display area. A total resolution that can easily comprise several hundred m...
Sebastian Thelen
ADHOC
2011
13 years 1 months ago
QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluations
—Research in wireless mesh networks have been growing in recent years. Many testbeds have been created to study networking protocols in wireless mesh networks. In this work, we d...
Daniel Wu, Dhruv Gupta, Prasant Mohapatra
CCGRID
2011
IEEE
13 years 1 months ago
Autonomic SLA-Driven Provisioning for Cloud Applications
Abstract—Significant achievements have been made for automated allocation of cloud resources. However, the performance of applications may be poor in peak load periods, unless t...
Nicolas Bonvin, Thanasis G. Papaioannou, Karl Aber...
CIDR
2011
337views Algorithms» more  CIDR 2011»
13 years 1 months ago
The Schema-Independent Database UI: A Proposed Holy Grail and Some Suggestions
If you have ever encountered a piece of highly domain-specific business software, you may have noticed that it was largely a graphical front-end to some relational database. You ...
Eirik Bakke, Edward Benson