Sciweavers

7225 search results - page 1195 / 1445
» On the Computational Power of Biochemistry
Sort
View
ISSA
2008
15 years 3 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
ICWN
2007
15 years 3 months ago
Comparing Agent Paradigms for Resource Management in Sensor Networks
— Management of power and other resources that effect field life is an important consideration in sensor networks. This paper presents and compares alternative agent paradigms ap...
Anish Anthony, Thomas C. Jannett
LREC
2008
117views Education» more  LREC 2008»
15 years 3 months ago
Chooser: a Multi-Task Annotation Tool
The paper presents a tool assisting manual annotation of linguistic data developed at the Department of Computational linguistics, IBL-BAS. Chooser is a general-purpose modular ap...
Svetla Koeva, Borislav Rizov, Svetlozara Leseva
IMF
2007
15 years 3 months ago
Towards Reliable Rootkit Detection in Live Response
: Within digital forensics investigations, the term Live Response refers to all activities that collect evidence on live systems. Though Live Response in general alters the state o...
Felix C. Freiling, Bastian Schwittay
MASCOTS
2007
15 years 3 months ago
Reducing Hybrid Disk Write Latency with Flash-Backed I/O Requests
—One of the biggest bottlenecks in desktop-based computing is the hard disk with I/O write latency being a key contributor. I/O write latency stems from the mechanical nature of ...
Timothy Bisson, Scott A. Brandt
« Prev « First page 1195 / 1445 Last » Next »