Sciweavers

10899 search results - page 2049 / 2180
» Wide Area Computation
Sort
View
MICRO
2006
IEEE
124views Hardware» more  MICRO 2006»
15 years 10 months ago
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
SSDBM
2006
IEEE
153views Database» more  SSDBM 2006»
15 years 10 months ago
HDF5-FastQuery: Accelerating Complex Queries on HDF Datasets using Fast Bitmap Indices
Large scale scientific data is often stored in scientific data formats such as FITS, netCDF and HDF. These storage formats are of particular interest to the scientific user com...
Luke J. Gosink, John Shalf, Kurt Stockinger, Keshe...
ACMACE
2006
ACM
15 years 10 months ago
Projecting tension in virtual environments through lighting
Interactive synthetic environments are currently used in a wide variety of applications, including video games, exposure therapy, education, and training. Their success in such do...
Magy Seif El-Nasr
ACMDIS
2006
ACM
15 years 10 months ago
Using kinetic typography to convey emotion in text-based interpersonal communication
Text-based interpersonal communication tools such as instant messenger are widely used today. These tools often feature emoticons that people use to express emotion to some degree...
Joonhwan Lee, Soojin Jun, Jodi Forlizzi, Scott E. ...
IMC
2006
ACM
15 years 10 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
« Prev « First page 2049 / 2180 Last » Next »