Sciweavers

13985 search results - page 2462 / 2797
» Active Feature Models
Sort
View
174
Voted
ISCA
2009
IEEE
239views Hardware» more  ISCA 2009»
15 years 11 months ago
Scalable high performance main memory system using phase-change memory technology
The memory subsystem accounts for a significant cost and power budget of a computer system. Current DRAM-based main memory systems are starting to hit the power and cost limit. A...
Moinuddin K. Qureshi, Vijayalakshmi Srinivasan, Ju...
ATAL
2009
Springer
15 years 11 months ago
Using rituals to express cultural differences in synthetic characters
There is currently an ongoing demand for richer Intelligent Virtual Environments (IVEs) populated with social intelligent agents. As a result, many agent architectures are taking ...
Samuel Mascarenhas, João Dias, Nuno Afonso,...
ESWS
2009
Springer
15 years 11 months ago
Collaborative Ocean Resource Interoperability: Multi-use of Ocean Data on the Semantic Web
: Earth Observations (EO) collect various characteristics of the objective environment using sensors which often have different measuring, spatial and temporal coverage. Making ind...
Feng (Barry) Tao, Jon Campbell, Maureen Pagnani, G...
RAID
2009
Springer
15 years 11 months ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen
SERSCISA
2009
Springer
15 years 11 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
« Prev « First page 2462 / 2797 Last » Next »