Sciweavers

34181 search results - page 522 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
ISI
2006
Springer
15 years 4 months ago
A Trust-Based Security Architecture for Ubiquitous Computing Systems
Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van...
DSS
2007
75views more  DSS 2007»
15 years 4 months ago
Short Term and Total Life Impact analysis of email worms in computer systems
This paper develops a methodology for analyzing and predicting the impact category of malicious code, particularly email worms. The current paper develops two frameworks to classi...
Insu Park, Raj Sharman, H. Raghav Rao, Shambhu J. ...
JSCIC
2006
49views more  JSCIC 2006»
15 years 4 months ago
Recovering High-Order Accuracy in WENO Computations of Steady-State Hyperbolic Systems
Sigal Gottlieb, David I. Gottlieb, Chi-Wang Shu
PC
2008
117views Management» more  PC 2008»
15 years 4 months ago
Visions for application development on hybrid computing systems
Roger D. Chamberlain, Joseph M. Lancaster, Ron K. ...