Sciweavers

457 search results - page 68 / 92
» Construction of a Highly Dependable Operating System
Sort
View
APBC
2003
14 years 11 months ago
Towards Transparent Access to Multiple Biological Databanks
Nowadays, biologists use a number of large biological databanks to find relevant information for their research. Users of these databanks face a number of problems. One problem i...
Patrick Lambrix, Vaida Jakoniene
ISICA
2009
Springer
15 years 4 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
ICOIN
2001
Springer
15 years 2 months ago
Pervasive Adaptation for Mobile Computing
Mobile Computing platforms such as mobile phones, PDAs or wearable computers operate in a much more volatile and limited environment than their stationary counterparts. Such platf...
Tim Edmonds, Andy Hopper, Steve Hodges
LCN
2006
IEEE
15 years 3 months ago
Performance Limits and Analysis of Contention-based IEEE 802.11 MAC
— Recent advance in IEEE 802.11 based standard has pushed the wireless bandwidth up to 600Mbps while keeping the same wireless medium access control (MAC) schemes for full backwa...
Shao-Cheng Wang, Ahmed Helmy
IPPS
2007
IEEE
15 years 4 months ago
Optimizing Sorting with Machine Learning Algorithms
The growing complexity of modern processors has made the development of highly efficient code increasingly difficult. Manually developing highly efficient code is usually expen...
Xiaoming Li, María Jesús Garzar&aacu...