Sciweavers

381 search results - page 17 / 77
» host 2008
Sort
View
ICDCS
2008
IEEE
14 years 2 months ago
Fair K Mutual Exclusion Algorithm for Peer to Peer Systems
k-mutual exclusion is an important problem for resourceintensive peer-to-peer applications ranging from aggregation to file downloads. In order to be practically useful, k-mutual...
Vijay Anand Reddy, Prateek Mittal, Indranil Gupta
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 1 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
WCNC
2008
IEEE
14 years 1 months ago
Senslets- Applets for the Sensor Internet
The Sensor Internet provides access to sensor services by connecting sensor nodes to the Internet infrastructure. To achieve this, current solutions rely on fixed access points or ...
Frank Siegemund, Muhammad Haroon, Junaid Ansari, P...
COLING
2008
13 years 9 months ago
Linguistically-Based Sub-Sentential Alignment for Terminology Extraction from a Bilingual Automotive Corpus
We present a sub-sentential alignment system that links linguistically motivated phrases in parallel texts based on lexical correspondences and syntactic similarity. We compare th...
Lieve Macken, Els Lefever, Véronique Hoste
SIAMAM
2008
75views more  SIAMAM 2008»
13 years 7 months ago
Models of Virulent Phage Growth with Application to Phage Therapy
We modify existing models of bacteriophage growth on an exponentially growing bacterial population by including (1) density dependent phage attack rates and (2) loss to phage due ...
Hal L. Smith