Sciweavers

813 search results - page 79 / 163
» desire 2010
Sort
View
EUROSEC
2010
ACM
14 years 1 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
CHI
2010
ACM
14 years 25 days ago
BioTISCH: the interactive molecular biology lab bench
In a molecular biology lab, scientists often need to execute strictly defined sequences of operations, typically mixing specific amounts of reagents. The exact steps require infor...
Florian Echtler, Maximilian Häussler, Gudrun ...
UM
2010
Springer
14 years 23 days ago
PersonisJ: Mobile, Client-Side User Modelling
The increasing trend towards powerful mobile phones opens many possibilities for valuable personalised services to be available on the phone. Client-side personalisation for these ...
Simon Gerber, Michael Fry, Judy Kay, Bob Kummerfel...
UM
2010
Springer
14 years 23 days ago
Bayesian Credibility Modeling for Personalized Recommendation in Participatory Media
In this paper, we focus on the challenge that users face in processing messages on the web posted in participatory media settings, such as blogs. It is desirable to recommend to us...
Aaditeshwar Seth, Jie Zhang, Robin Cohen
GLVLSI
2010
IEEE
187views VLSI» more  GLVLSI 2010»
14 years 16 days ago
Write activity reduction on flash main memory via smart victim cache
Flash Memory is a desirable candidate for main memory replacement in embedded systems due to its low leakage power consumption, higher density and non-volatility characteristics. ...
Liang Shi, Chun Jason Xue, Jingtong Hu, Wei-Che Ts...