Sciweavers

1040 search results - page 132 / 208
» Resource Usage Verification
Sort
View
IJNSEC
2006
96views more  IJNSEC 2006»
15 years 3 months ago
A Memory Symptom-based Virus Detection Approach
The widespread use of the Internet has caused computer security to become an important issue. Currently, antivirus software is the primary mechanism that prevents computers from t...
Hsien-Chou Liao, Yi-Hsiang Wang
JDFP
2006
139views more  JDFP 2006»
15 years 3 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
181
Voted
PERCOM
2010
ACM
14 years 10 months ago
Using Wi-Fi to save energy via P2P remote execution
Abstract-- Mobile devices are becoming increasingly powerful with regards to processing speed, networking capabilities, storage capacity etc. While these improvements open up new p...
Mads Darø Kristensen, Niels Olof Bouvin
WWW
2006
ACM
16 years 4 months ago
Exploring social annotations for the semantic web
In order to obtain a machine understandable semantics for web resources, research on the Semantic Web tries to annotate web resources with concepts and relations from explicitly d...
Xian Wu, Lei Zhang, Yong Yu
182
Voted
WWW
2002
ACM
16 years 4 months ago
RQL: a declarative query language for RDF
Real-scale Semantic Web applications, such as Knowledge Portals and E-Marketplaces, require the managementof large volumes of metadata, i.e., information describing the available ...
Gregory Karvounarakis, Sofia Alexaki, Vassilis Chr...