Sciweavers

3471 search results - page 599 / 695
» User activity histories
Sort
View
ISLPED
2003
ACM
111views Hardware» more  ISLPED 2003»
15 years 3 months ago
Energy-aware memory allocation in heterogeneous non-volatile memory systems
Memory systems consume a significant portion of power in handheld embedded systems. So far, low-power memory techniques have addressed the power consumption when the system is tu...
Hyung Gyu Lee, Naehyuck Chang
NSPW
2003
ACM
15 years 3 months ago
Locality: a new paradigm for thinking about normal behavior and outsider threat
Locality as a unifying concept for understanding the normal behavior of benign users of computer systems is suggested as a unifying paradigm that will support the detection of mal...
John McHugh, Carrie Gates
AGENTCL
2003
Springer
15 years 3 months ago
Intra-role Coordination Using Group Communication: A Preliminary Report
We propose group communication for agent coordination within “active rooms” and other pervasive computing scenarios featuring strict real-time requirements, inherently unrelia...
Paolo Busetta, Mattia Merzi, Silvia Rossi, Fran&cc...
AMINING
2003
Springer
261views Data Mining» more  AMINING 2003»
15 years 3 months ago
Micro View and Macro View Approaches to Discovered Rule Filtering
A data mining system can semi-automatically discover knowledge by mining a large volume of data, but the discovered knowledge is not always novel and may contain unreasonable facts...
Yasuhiko Kitamura, Akira Iida, Keunsik Park
AP2PC
2003
Springer
15 years 3 months ago
P2P MetaData Search Layers
Distributed Hashtables (DHTs) provide a scalable method of associating file-hashes with a particular location in a distributed network environment. Modifying DHTs directly to suppo...
Sam Joseph