Sciweavers

759 search results - page 132 / 152
» Verification of a Microprocessor Using Real World Applicatio...
Sort
View
SOUPS
2005
ACM
14 years 4 months ago
Stopping spyware at the gate: a user study of privacy, notice and spyware
Spyware is a significant problem for most computer users. The term “spyware” loosely describes a new class of computer software. This type of software may track user activitie...
Nathaniel Good, Rachna Dhamija, Jens Grossklags, D...
AXMEDIS
2006
IEEE
241views Multimedia» more  AXMEDIS 2006»
14 years 2 months ago
SMIL to MPEG-4 BIFS Conversion
Traditional media, such as text, image, audio and video, have long been the main media resources and granted full support of standard desktop tools and applications. Interactive r...
Beilu Shao, Laureano Moro Velazquez, Nicolas Scari...
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
14 years 2 months ago
Evolving distributed agents for managing air traffic
Air traffic management offers an intriguing real world challenge to designing large scale distributed systems using evolutionary computation. The ability to evolve effective air t...
Adrian K. Agogino, Kagan Tumer
ICPP
2009
IEEE
14 years 5 months ago
Improving Resource Availability by Relaxing Network Allocation Constraints on Blue Gene/P
— High-end computing (HEC) systems have passed the petaflop barrier and continue to move toward the next frontier of exascale computing. As companies and research institutes con...
Narayan Desai, Darius Buntinas, Daniel Buettner, P...
MM
2006
ACM
157views Multimedia» more  MM 2006»
14 years 4 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo