Sciweavers

6819 search results - page 1199 / 1364
» Process Reuse Architecture
Sort
View
131
Voted
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
15 years 9 months ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh
CCGRID
2003
IEEE
15 years 9 months ago
Peer-to-Peer Keyword Search Using Keyword Relationship
Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for Internet-scale information retrieval and search systems because they require neither...
Kiyohide Nakauchi, Yuichi Ishikawa, Hiroyuki Morik...
HICSS
2003
IEEE
168views Biometrics» more  HICSS 2003»
15 years 9 months ago
'Pay-per-use' Concept in Healthcare: A Grounded Theory Perspective
Healthcare organizations worldwide are faced with the growing challenge of introducing structural and technological reforms and cost-effective IT solutions that will transform the...
Abdullah A. Akbar
247
Voted
ICCAD
2003
IEEE
325views Hardware» more  ICCAD 2003»
15 years 9 months ago
Hardware Scheduling for Dynamic Adaptability using External Profiling and Hardware Threading
While performance, area, and power constraints have been the driving force in designing current communication-enabled embedded systems, post-fabrication and run-time adaptability ...
Brian Swahn, Soha Hassoun
127
Voted
ICPP
2003
IEEE
15 years 9 months ago
Scheduling Algorithms with Bus Bandwidth Considerations for SMPs
The bus that connects processors to memory is known to be a major architectural bottleneck in SMPs. However, both software and scheduling policies for these systems generally focu...
Christos D. Antonopoulos, Dimitrios S. Nikolopoulo...
« Prev « First page 1199 / 1364 Last » Next »