Sciweavers

15379 search results - page 3017 / 3076
» Protecting users from
Sort
View
VIIP
2001
13 years 10 months ago
3-D Haar Wavelet Transformation and Texture-based 3-D Reconstruction of Biomedical Data Sets
Enhanced biomedical image scanning technology and growing network accessibility have created a need for faster and more efficient data exchange over the Internet and in closed net...
Pujita Pinnamaneni, Sagar Saladi, Joerg Meyer
IM
2003
13 years 10 months ago
Facilitating Efficient and Reliable Monitoring through HAMSA
: Monitoring is a fundamental building block of any network management system. It is needed to ensure that the network operates within the required parameters, and to account for u...
David Breitgand, Danny Dolev, Danny Raz, Gleb Shav...
USENIX
2004
13 years 10 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
PDPTA
2003
13 years 10 months ago
Tuxedo: A Peer-to-Peer Caching System
We are witnessing two trends in Web content access: (a) increasing amounts of dynamic and personalized Web content, and (b) a significant growth in “on-the-move” access using...
Weisong Shi, Kandarp Shah, Yonggen Mao, Vipin Chau...
AAAI
1998
13 years 10 months ago
Conversation Machines for Transaction Processing
We have built a set of integrated AI systems (called conversation machines) to enable transaction processing over the telephone for limited domains like stock trading and banking....
Wlodek Zadrozny, Catherine G. Wolf, Nanda Kambhatl...
« Prev « First page 3017 / 3076 Last » Next »