Sciweavers

3451 search results - page 601 / 691
» The Architecture and Implementation of Resource Space Model ...
Sort
View
CCS
2007
ACM
15 years 4 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
ICAC
2007
IEEE
15 years 4 months ago
Adaptive Learning of Metric Correlations for Temperature-Aware Database Provisioning
This paper introduces a transparent self-configuring architecture for automatic scaling with temperature awareness in the database tier of a dynamic content web server. We use a ...
Saeed Ghanbari, Gokul Soundararajan, Jin Chen, Cri...
INFFUS
2007
107views more  INFFUS 2007»
14 years 9 months ago
An information fusion demonstrator for tactical intelligence processing in network-based defense
The Swedish Defence Research Agency (FOI) has developed a concept demonstrator called the Information Fusion Demonstrator 2003 (IFD03) for demonstrating information fusion methodo...
Simon Ahlberg, Pontus Hörling, Katarina Johan...
EGH
2004
Springer
15 years 3 months ago
A programmable vertex shader with fixed-point SIMD datapath for low power wireless applications
The real time 3D graphics becomes one of the attractive applications for 3G wireless terminals although their battery lifetime and memory bandwidth limit the system resources for ...
Ju-Ho Sohn, Ramchan Woo, Hoi-Jun Yoo
VIS
2004
IEEE
106views Visualization» more  VIS 2004»
15 years 11 months ago
Linking Representation with Meaning
The purpose of visualization is not just to depict data, but to gain or present insight into the domain represented in data. However in visualization systems, this link between fe...
David Duke