Sciweavers

21520 search results - page 4128 / 4304
» Symmetric network computation
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 11 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
GROUP
2009
ACM
15 years 11 months ago
WaterCooler: exploring an organization through enterprise social media
As organizations scale up, their collective knowledge increases, and the potential for serendipitous collaboration between members grows dramatically. However, finding people wit...
Michael J. Brzozowski
MM
2009
ACM
126views Multimedia» more  MM 2009»
15 years 11 months ago
MOGFUN: musical mObile group for FUN
The computational power and sensory capabilities of mobile devices are increasing dramatically these days, rendering them suitable for real-time sound synthesis and various musica...
Yinsheng Zhou, Zhonghua Li, Dillion Tan, Graham Pe...
SIGCOMM
2009
ACM
15 years 11 months ago
Economic issues in shared infrastructures
We define some interesting incentive issues that arise in the management of virtual infrastructures. We demonstrate that participants’ decisions about the quantities of infrast...
Costas Courcoubetis, Richard R. Weber
CLADE
2008
IEEE
15 years 11 months ago
SWARM: a scientific workflow for supporting bayesian approaches to improve metabolic models
With the exponential growth of complete genome sequences, the analysis of these sequences is becoming a powerful approach to build genome-scale metabolic models. These models can ...
Xinghua Shi, Rick Stevens
« Prev « First page 4128 / 4304 Last » Next »