Sciweavers

6171 search results - page 1057 / 1235
» The FrameNet Data and Software
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 10 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
VL
2008
IEEE
171views Visual Languages» more  VL 2008»
15 years 10 months ago
Usability challenges for enterprise service-oriented architecture APIs
An important part of many programming tasks is the use of libraries and other forms of Application Programming Interfaces (APIs). Programming via web services using a Service-Orie...
Jack Beaton, Sae Young Jeong, Yingyu Xie, Jeffrey ...
ADHOCNOW
2008
Springer
15 years 10 months ago
DIN: An Ad-Hoc Algorithm to Estimate Distances in Wireless Sensor Networks
Abstract. A current challenge in wireless sensor networks is the positioning of sensor nodes for indoor environments without dedicated hardware. Especially in this domain, many app...
Freddy López Villafuerte, Jochen H. Schille...
BIBM
2007
IEEE
144views Bioinformatics» more  BIBM 2007»
15 years 10 months ago
Kinetic Modeling Using BioPAX Ontology
Thousands of biochemical interactions are available for download from curated databases such as Reactome, Pathway Interaction Database and other sources in the Biological Pathways...
Oliver Ruebenacker, Ion I. Moraru, James C. Schaff...
CCGRID
2007
IEEE
15 years 10 months ago
Virtual Clusters on the Fly - Fast, Scalable, and Flexible Installation
One of the advantages in virtualized computing clusters compared to traditional shared HPC environments is their ability to accommodate user-specific system customization. Howeve...
Hideo Nishimura, Naoya Maruyama, Satoshi Matsuoka
« Prev « First page 1057 / 1235 Last » Next »