Sciweavers

2503 search results - page 438 / 501
» Building Computer Network Attacks
Sort
View
ICDCSW
2003
IEEE
15 years 10 months ago
Studying the Use of Handhelds to Control Smart Appliances
Abstract— Today’s complex appliances are plagued by difficultto-use interfaces. In many cases, consumers use only a few of the many features on their appliances because the mor...
Jeffrey Nichols, Brad A. Myers
IEEEAMS
2003
IEEE
15 years 10 months ago
Kinesthetics eXtreme: An External Infrastructure for Monitoring Distributed Legacy Systems
Autonomic computing – self-configuring, self-healing, self-optimizing applications, systems and networks – is widely believed to be a promising solution to everincreasing syst...
Gail E. Kaiser, Janak J. Parekh, Philip Gross, Giu...
SC
2000
ACM
15 years 9 months ago
Expressing and Enforcing Distributed Resource Sharing Agreements
Advances in computing and networking technology, and an explosion in information sources has resulted in a growing number of distributed systems getting constructed out of resourc...
Tao Zhao, Vijay Karamcheti
258
Voted
ICCV
2009
IEEE
6637views Computer Vision» more  ICCV 2009»
16 years 10 months ago
A Markov Clustering Topic Model for Mining Behaviour in Video
This paper addresses the problem of fully automated mining of public space video data. A novel Markov Clustering Topic Model (MCTM) is introduced which builds on existing Dynami...
Timothy Hospedales, Shaogang Gong, Tao Xiang
IPPS
2007
IEEE
15 years 11 months ago
Speculative Flow Control for High-Radix Datacenter Interconnect Routers
High-radix switches are desirable building blocks for large computer interconnection networks, because they are more suitable to convert chip I/O bandwidth into low latency and lo...
Cyriel Minkenberg, Mitchell Gusat