Sciweavers

1156 search results - page 122 / 232
» The PENG System: Practice and Experience
Sort
View
IMF
2007
15 years 27 days ago
Towards Reliable Rootkit Detection in Live Response
: Within digital forensics investigations, the term Live Response refers to all activities that collect evidence on live systems. Though Live Response in general alters the state o...
Felix C. Freiling, Bastian Schwittay
AAAI
1996
15 years 24 days ago
Agent Amplified Communication
We propose an agent-based framework for assisting and simplifying person-to-person communication for information gathering tasks. As an example, we focus on locating experts for a...
Henry A. Kautz, Bart Selman, Al Milewski
CGA
2006
14 years 11 months ago
Secrets to Success and Fatal Flaws: The Design of Large-Display Groupware
Large displays are becoming increasingly common technologies in the workplace because of their potential as information displays and collaboration surfaces. Despite its growing ub...
Elaine M. Huang, Elizabeth D. Mynatt, Daniel M. Ru...
TELSYS
2008
99views more  TELSYS 2008»
14 years 11 months ago
Mote-based underwater sensor networks: opportunities, challenges, and guidelines
Most underwater networks rely on expensive specialized hardware for acoustic communication and modulation. This has impeded wide scale deployments of underwater sensor networks and...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
93
Voted
STOC
2006
ACM
121views Algorithms» more  STOC 2006»
15 years 5 months ago
On adequate performance measures for paging
Memory management is a fundamental problem in computer architecture and operating systems. We consider a two-level memory system with fast, but small cache and slow, but large mai...
Konstantinos Panagiotou, Alexander Souza