Sciweavers

628 search results - page 119 / 126
» Effectively Open Real Functions
Sort
View
99
Voted
ASSETS
2009
ACM
15 years 6 months ago
Speaking through pictures: images vs. icons
People with aphasia, a condition that impairs the ability to understand or generate written or spoken language, are aided by assistive technology that helps them communicate throu...
Xiaojuan Ma, Jordan L. Boyd-Graber, Sonya S. Nikol...
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 6 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
RTCSA
2007
IEEE
15 years 6 months ago
Scheduling Algorithms for I/O Blockings with a Multi-frame Task Model
A task that suspends itself to wait for an I/O completion or to wait for an event from another node in distributed environments is called an I/O blocking task. In conventional har...
Shan Ding, Hiroyuki Tomiyama, Hiroaki Takada
SECON
2007
IEEE
15 years 6 months ago
Fairness and Physical Layer Capture in Random Access Networks
Abstract— While physical layer capture has been observed in real implementations of wireless devices which randomly accessing shared channels, fair rate control algorithms based ...
Hoon Chang, Vishal Misra, Dan Rubenstein
ICDM
2006
IEEE
166views Data Mining» more  ICDM 2006»
15 years 5 months ago
Mining Generalized Graph Patterns Based on User Examples
There has been a lot of recent interest in mining patterns from graphs. Often, the exact structure of the patterns of interest is not known. This happens, for example, when molecu...
Pavel Dmitriev, Carl Lagoze