Sciweavers

130 search results - page 5 / 26
» RKB Explorer: Application and Infrastructure
Sort
View
NDSS
2000
IEEE
13 years 11 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
MIS
2008
Springer
149views Multimedia» more  MIS 2008»
13 years 7 months ago
Home-Explorer: Ontology-based physical artifact search and hidden object detection system
A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses s...
Bin Guo, Satoru Satake, Michita Imai
PC
1998
196views Management» more  PC 1998»
13 years 7 months ago
DataExchange: High Performance Communications in Distributed Laboratories
Current communications tools and libraries for high performance computing are designed for platforms and applications that exhibit relatively stable computational and communicatio...
Greg Eisenhauer, Beth Plale, Karsten Schwan
EXPERT
2008
120views more  EXPERT 2008»
13 years 7 months ago
The CKC Challenge: Exploring Tools for Collaborative Knowledge Construction
The great success of Web 2.0 is mainly fuelled by an infrastructure that allows web users to create, share, tag, and connect content and knowledge easily. The tools for developing...
Natalya Fridman Noy, Abhita Chugh, Harith Alani
ICC
2011
IEEE
269views Communications» more  ICC 2011»
12 years 7 months ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino