Sciweavers

1548 search results - page 241 / 310
» Data sharing between ada and C C
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 6 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
ICMCS
2007
IEEE
112views Multimedia» more  ICMCS 2007»
15 years 6 months ago
Peer-to-Peer Streaming with Hierarchical Network Coding
Abstract— In recent years, Content Delivery Networks (CDN) and Peerto-Peer (P2P) networks have emerged as two effective paradigms for delivering multimedia contents over the Inte...
Kien Nguyen, Thinh Nguyen, Sen-Ching S. Cheung
IEEEARES
2007
IEEE
15 years 6 months ago
Applying a Tradeoff Model (TOM) to TACT
In a software system, it is inevitable that components will occasionally fail to produce acceptable results and become unavailable to serve its clients. Replication is the techniq...
Raihan Al-Ekram, Richard C. Holt, Chris Hobbs
ISPASS
2007
IEEE
15 years 6 months ago
An Analysis of Performance Interference Effects in Virtual Environments
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
AIED
2007
Springer
15 years 6 months ago
Mind and Body: Dialogue and Posture for Affect Detection in Learning Environments
We investigated the potential of automatic detection of a learner’s affective states from posture patterns and dialogue features obtained from an interaction with AutoTutor, an i...
Sidney K. D'Mello, Arthur C. Graesser