Sciweavers

1308 search results - page 98 / 262
» Let's Have a Conversation
Sort
View
ACSAC
2009
IEEE
15 years 6 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
UIC
2009
Springer
15 years 5 months ago
Mining and Visualizing Mobile Social Network Based on Bayesian Probabilistic Model
Social networking has provided powerful new ways to find people, organize groups, and share information. Recently, the potential functionalities of the ubiquitous infrastructure le...
Jun-Ki Min, Su-Hyung Jang, Sung-Bae Cho
IDEAS
2005
IEEE
124views Database» more  IDEAS 2005»
15 years 4 months ago
Flexible Update Management in Peer-to-Peer Database Systems
Promising the combination of dynamic configuration, scalability and redundancy, peer-to-peer (P2P) networks have garnered tremendous interest lately. Before long, this interest ex...
David Del Vecchio, Sang Hyuk Son
SC
2003
ACM
15 years 4 months ago
Communities Collaborating to Bridge the Digital Divide: The Tribal Virtual Network
The Digital Divide has become a catch phrase and political banner that defines the divide between the “have and have-nots” of internet-based technologies.1 Many rural and Nati...
Maria Williams, Vernon Lujan, Ron Solimon, Lorene ...
GECCO
2010
Springer
151views Optimization» more  GECCO 2010»
15 years 4 months ago
Sustaining behavioral diversity in NEAT
Niching schemes, which sustain population diversity and let an evolutionary population avoid premature convergence, have been extensively studied in the research field of evoluti...
Hirotaka Moriguchi, Shinichi Honiden