Sciweavers

536 search results - page 31 / 108
» Deconstructing process isolation
Sort
View
118
Voted
MICCAI
2009
Springer
16 years 2 days ago
Constrained Data Decomposition and Regression for Analyzing Healthy Aging from Fiber Tract Diffusion Properties
Abstract. It has been shown that brain structures in normal aging undergo significant changes attributed to neurodevelopmental and neurodegeneration processes as a lifelong, dynami...
Sylvain Gouttard, Marcel Prastawa, Elizabeth Bulli...
116
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
On the Expected Connection Lifetime and Stochastic Resilience of Wireless Multi-Hop Networks
—To understand how node mobility and Byzantine node failures affect connectivity of wireless multi-hop networks, this paper investigates resilience of geometric random graphs to ...
Fei Xing, Wenye Wang
115
Voted
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 8 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
132
Voted
HOTOS
2009
IEEE
15 years 6 months ago
Operating Systems Should Provide Transactions
Operating systems can efficiently provide system transactions to user applications, in which user-level processes can execute a series of system calls atomically and in isolation ...
Donald E. Porter, Emmett Witchel
103
Voted
ICASSP
2010
IEEE
15 years 3 months ago
An alternate approach to adaptive beamforming using SRP-PHAT
An important application for microphone arrays is to extract highquality output from a single wideband source in multi-source and adverse environments. Methods based on blind-sour...
Avram Levi, Harvey F. Silverman