Sciweavers

6666 search results - page 1235 / 1334
» Reconfigurable Computing for High Performance Networking App...
Sort
View
CEC
2008
IEEE
15 years 4 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
SBACPAD
2003
IEEE
125views Hardware» more  SBACPAD 2003»
15 years 3 months ago
Applying Scheduling by Edge Reversal to Constraint Partitioning
— Scheduling by Edge Reversal (SER) is a fully distributed scheduling mechanism based on the manipulation of acyclic orientations of a graph. This work uses SER to perform constr...
Marluce Rodrigues Pereira, Patrícia Kayser ...
WETICE
2003
IEEE
15 years 3 months ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
CSE
2009
IEEE
15 years 2 months ago
Quantifying Utility and Trustworthiness for Advice Shared on Online Social Media
—The growing popularity of social media in recent years has resulted in the creation of an enormous amount of user-developed content. While information is readily available, ther...
Sai T. Moturu, Jian Yang, Huan Liu
MKWI
2008
150views Business» more  MKWI 2008»
14 years 11 months ago
A Reference Model for Seamless Cross-Organizational Collaboration in the Public Sector
: Today, electronic cross-company collaboration is about to gain significant momentum, but still shows weaknesses with respect to productivity, flexibility and quality: A lack of s...
Christoph Schroth
« Prev « First page 1235 / 1334 Last » Next »