Sciweavers

1709 search results - page 285 / 342
» networks 2000
Sort
View
NDSS
2000
IEEE
14 years 10 days ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
NOMS
2000
IEEE
131views Communications» more  NOMS 2000»
14 years 1 months ago
Provision of global number portability using CORBA
Global Number Portability (GNP) is becoming a key service to increase competition and profit of a service provider for the ever-growing telephone marketplace. In this paper, we pr...
Kyu-Hyung Kim, Dong-Hee Lee, Eun-Ju Ha, Jong-Tae P...
ECTEL
2006
Springer
14 years 13 days ago
An Example of Participatory Design Methodology in a Project which Aims at Developing Individual and Organisational Learning in C
The experience described in this paper is being developed in the framework of the PALETTE1 project by two teams of researchers involved in collecting information from some Communi...
Amaury Daele, Martin Erpicum, Liliane Esnault, Fab...
IDA
2000
Springer
13 years 8 months ago
Supervised model-based visualization of high-dimensional data
When high-dimensional data vectors are visualized on a two- or three-dimensional display, the goal is that two vectors close to each other in the multi-dimensional space should als...
Petri Kontkanen, Jussi Lahtinen, Petri Myllymä...
JSA
2000
115views more  JSA 2000»
13 years 8 months ago
Scheduling optimization through iterative refinement
Scheduling DAGs with communication times is the theoretical basis for achieving efficient parallelism on distributed memory systems. We generalize Graham's task-level in a ma...
Mayez A. Al-Mouhamed, Adel Al-Massarani