Sciweavers

7504 search results - page 1220 / 1501
» Computing with Action Potentials
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 9 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
ICNP
2003
IEEE
15 years 9 months ago
Resilient Peer-to-Peer Streaming
We consider the problem of distributing “live” streaming media content to a potentially large and highly dynamic population of hosts. Peer-to-peer content distribution is attr...
Venkata N. Padmanabhan, Helen J. Wang, Philip A. C...
ICTAI
2003
IEEE
15 years 9 months ago
An Intelligent Early Warning System for Software Quality Improvement and Project Management
One of the main reasons behind unfruitful software development projects is that it is often too late to correct the problems by the time they are detected. It clearly indicates th...
Xiaoqing Frank Liu, Gautam Kane, Monu Bambroo
INFOVIS
2003
IEEE
15 years 9 months ago
FundExplorer: Supporting the Diversification of Mutual Fund Portfolios Using Context Treemaps
An equity mutual fund is a financial instrument that invests in a set of stocks. Any two different funds may partially invest in some of the same stocks, thus overlap is common. P...
Christoph Csallner, Marcus Handte, Othmar Lehmann,...
LCN
2003
IEEE
15 years 9 months ago
Using a Gigabit Ethernet Cluster as a Distributed Disk Array with Multiple Fault Tolerance
A cluster of PCs can be seen as a collection of networked low cost disks; such a collection can be operated by proper so as to provide the abstraction of a single, larger block de...
Alessandro Di Marco, Giovanni Chiola, Giuseppe Cia...
« Prev « First page 1220 / 1501 Last » Next »