Sciweavers

20813 search results - page 358 / 4163
» Introduction to Computer Networking
Sort
View
AINA
2007
IEEE
15 years 10 months ago
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System
Malware and rootkits are serious security vulnerabilities, and they can be designed to be resistant to anti-viral software, or even totally undetectable. This paper described a hi...
Lifu Wang, Partha Dasgupta
NCA
2007
IEEE
15 years 10 months ago
GRIDTS: A New Approach for Fault-Tolerant Scheduling in Grid Computing
This paper proposes GRIDTS, a grid infrastructure in which the resources select the tasks they execute, on the contrary to traditional infrastructures where schedulers find resou...
Fábio Favarim, Joni da Silva Fraga, Lau Che...
NOMS
2006
IEEE
129views Communications» more  NOMS 2006»
15 years 9 months ago
A Framework for the Decentralisation and Management of Collaborative Applications in Ubiquitous Computing Environments
—When deploying collaborative applications such as Instant Messaging in ubiquitous computing environments significant enhancements can be afforded by offering additional context ...
Karl Quinn, Austin Kenny, Kevin Feeney, David Lewi...
138
Voted
ITCC
2005
IEEE
15 years 9 months ago
Real Stock Trading Using Soft Computing Models
The main focus of this study is to compare different performances of soft computing paradigms for predicting the direction of individuals stocks. Three different artificial intell...
Brent Doeksen, Ajith Abraham, Johnson P. Thomas, M...
MM
2003
ACM
80views Multimedia» more  MM 2003»
15 years 9 months ago
Position calibration of audio sensors and actuators in a distributed computing platform
In this paper, we present a novel approach to automatically determine the positions of sensors and actuators in an ad-hoc distributed network of heterogeneous general purpose comp...
Vikas C. Raykar, Igor Kozintsev, Rainer Lienhart