Sciweavers

4658 search results - page 758 / 932
» Swarms in Dynamic Environments
Sort
View
ISI
2004
Springer
15 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
ISMIR
2004
Springer
145views Music» more  ISMIR 2004»
15 years 10 months ago
Audio Fingerprinting In Peer-to-peer Networks
Despite the immense potential of Peer-to-Peer (P2P) networks in facilitating collaborative applications, they have become largely known as a free haven for pirated music swapping....
Prarthana Shrestha, Ton Kalker
131
Voted
ITS
2004
Springer
204views Multimedia» more  ITS 2004»
15 years 10 months ago
FlexiTrainer: A Visual Authoring Framework for Case-Based Intelligent Tutoring Systems
The need for rapid and cost-effective development Intelligent Tutoring Systems with flexible pedagogical approaches has led to a demand for authoring tools. The authoring systems ...
Sowmya Ramachandran, Emilio Remolina, Daniel Fu
IWMM
2004
Springer
92views Hardware» more  IWMM 2004»
15 years 10 months ago
Memory accounting without partitions
Operating systems account for memory consumption and allow for termination at the level of individual processes. As a result, if one process consumes too much memory, it can be te...
Adam Wick, Matthew Flatt
IWQOS
2004
Springer
15 years 10 months ago
On quality-of-service and energy consumption tradeoffs in FEC-encoded audio streaming
This paper addresses the energy consumption of forward error correction (FEC) protocols as used to improve quality-of-service (QoS) for wireless computing devices. The paper also ...
Zhinan Zhou, Philip K. McKinley, Seyed Masoud Sadj...