Sciweavers

820 search results - page 153 / 164
» Techniques for Efficient Interactive Configuration of Distri...
Sort
View
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
WWW
2008
ACM
14 years 8 months ago
Service-oriented data denormalization for scalable web applications
Many techniques have been proposed to scale web applications. However, the data interdependencies between the database queries and transactions issued by the applications limit th...
Zhou Wei, Dejun Jiang, Guillaume Pierre, Chi-Hung ...
ISCAS
2007
IEEE
179views Hardware» more  ISCAS 2007»
14 years 1 months ago
Analysis for Signal and Power Integrity Using the Multilayered Finite Difference Method
— We present a method for fast analysis of signal and power integrity based on a recently developed multilayered finite difference method (M-FDM). In order to accurately model m...
Ege Engin, Krishna Bharath, Madhavan Swaminathan
ICALT
2006
IEEE
14 years 1 months ago
Instruction Through The Ages: Building Pervasive Virtual Instructors for Life Long Learning
A pervasive virtual instructor is an artificially intelligent instructor that may appear transparent to the learner or appear in the form of a threedimensional graphical character...
Jayfus T. Doswell
MM
2004
ACM
107views Multimedia» more  MM 2004»
14 years 27 days ago
Time, voice, and joyce
We present a design for recapitulating walks through Dublin's City Centre by characters in James Joyce's Ulysses. Our computationally supported walkers will avail themse...
Andrea Taylor, Brendan Donovan, Zoltan Foley-Fishe...