Sciweavers

1885 search results - page 319 / 377
» Methodology of distributed technological complex system simu...
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 3 months ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
15 years 10 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
IWIA
2006
IEEE
15 years 3 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
HPCC
2005
Springer
15 years 3 months ago
Factory: An Object-Oriented Parallel Programming Substrate for Deep Multiprocessors
Abstract. Recent advances in processor technology such as Simultaneous Multithreading (SMT) and Chip Multiprocessing (CMP) enable parallel processing on a single die. These process...
Scott Schneider, Christos D. Antonopoulos, Dimitri...
ACMSE
2004
ACM
15 years 3 months ago
Mapping component specifications to Enterprise JavaBeans implementations
Component-based software development has become an important approach to building complex software systems. Much research focuses on component specification to achieve the advanta...
Yi Liu, H. Conrad Cunningham