Sciweavers

10837 search results - page 1875 / 2168
» Adaptive User Interfaces
Sort
View
104
Voted
DSN
2005
IEEE
15 years 10 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
DSRT
2005
IEEE
15 years 10 months ago
A Simple Distributed Simulation Architecture for Emergency Response Exercises
This paper describes a simple distributed simulation for support of emergency response exercises. The simulation, called the Immersive Synthetic Environment for Exercises (ISEE), ...
Dennis McGrath, Amy Hunt, Marion Bates
EUROMICRO
2005
IEEE
15 years 10 months ago
Naked Objects versus Traditional Mobile Platform Development: A Comparative Case Study
It has been suggested that use of the Naked Objects pattern could contribute to business agility of applications and reduce the amount of the application code up to 75 percent in ...
Heikki Keränen, Pekka Abrahamsson
EUROMICRO
2005
IEEE
15 years 10 months ago
Developing Content-Intensive Applications with XML Documents, Document Transformations and Software Components
This paper describes DTC (Documents, Transformations and Components), our approach to the XML-based development of content-intensive applications. According to this approach, the ...
José Luis Sierra, Alfredo Fernández-...
FCCM
2005
IEEE
115views VLSI» more  FCCM 2005»
15 years 10 months ago
FIFO Communication Models in Operating Systems for Reconfigurable Computing
Increasing demands upon embedded systems for higher level services like networking, user interfaces and file system management, are driving growth in fully-featured operating syst...
John A. Williams, Neil W. Bergmann, X. Xie
« Prev « First page 1875 / 2168 Last » Next »