Sciweavers

2454 search results - page 359 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ISI
2008
Springer
14 years 10 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
MDM
2004
Springer
147views Communications» more  MDM 2004»
15 years 3 months ago
Mobile Agents: Can They Assist with Context Awareness?
This position paper argues that the mobile agents paradigm is a useful and important technology enabling pervasive and ubiquitous computing. Context awareness drives adaptability ...
Arkady B. Zaslavsky
PARCO
1997
14 years 11 months ago
Scheduling Block-Cyclic Array Redistribution
This article is devoted to the run-time redistribution of arrays that are distributed in a blockcyclic fashion over a multidimensional processor grid. While previous studies have ...
Frederic Desprez, Jack Dongarra, Antoine Petitet, ...
ASSETS
2010
ACM
14 years 10 months ago
A web-based user survey for evaluating power saving strategies for deaf users of mobileASL
MobileASL is a video compression project for two-way, real-time video communication on cell phones, allowing Deaf people to communicate in the language most accessible to them, Am...
Jessica J. Tran, Tressa W. Johnson, Joy Kim, Rafae...
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 4 months ago
Distributed Innovation in Classes of Networks
Rapid developments in digital technologies have brought to force new challenges in innovation. In this paper, we propose a taxonomic framework of innovation networks in order to i...
Youngjin Yoo, Kalle Lyytinen, Richard J. Boland Jr...