Sciweavers

264 search results - page 30 / 53
» Implementation and evaluation of EXT3NS multimedia file syst...
Sort
View
ACSAC
2003
IEEE
15 years 2 months ago
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
JNCA
2007
126views more  JNCA 2007»
14 years 9 months ago
Usage derived recommendations for a video digital library
We describe a minimalist methodology to develop usage-based recommender systems for multimedia digital libraries. A prototype recommender system based on this strategy was impleme...
Johan Bollen, Michael L. Nelson, Gary Geisler, Raq...
ITS
1998
Springer
133views Multimedia» more  ITS 1998»
15 years 1 months ago
The Foundations and Architecture of Autotutor
The Tutoring Research Group at the University of Memphis is developing an intelligent tutoring system which takes advantages of recent technological advances in the areas of semant...
Peter M. Wiemer-Hastings, Arthur C. Graesser, Dere...
ESTIMEDIA
2008
Springer
14 years 11 months ago
Serialized multitasking code generation from dataflow specification
This paper is concerned about multitasking embedded software development from the system specification to the final implementation including design space exploration(DSE). In the ...
Seongnam Kwon, Soonhoi Ha
WWW
2005
ACM
15 years 10 months ago
Hierarchical substring caching for efficient content distribution to low-bandwidth clients
While overall bandwidth in the internet has grown rapidly over the last few years, and an increasing number of clients enjoy broadband connectivity, many others still access the i...
Utku Irmak, Torsten Suel