Sciweavers

7839 search results - page 1490 / 1568
» What's Clicking What
Sort
View
119
Voted
IJDE
2006
95views more  IJDE 2006»
15 years 22 days ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
96
Voted
ISJ
2008
93views more  ISJ 2008»
15 years 22 days ago
Knowledge transfer in globally distributed teams: the role of transactive memory
Abstract. This paper explores the role of transactive memory in enabling knowledge transfer between globally distributed teams. While the information systems literature has recentl...
Ilan Oshri, Paul C. van Fenema, Julia Kotlarsky
128
Voted
IVS
2008
145views more  IVS 2008»
15 years 22 days ago
Towards a taxonomy of movement patterns
A review of research that has been carried out on data mining and visual analysis of movement patterns suggests that there is little agreement on the relevant types of movement pa...
Somayeh Dodge, Robert Weibel, Anna-Katharina Laute...
116
Voted
JAIR
2008
104views more  JAIR 2008»
15 years 22 days ago
On the Qualitative Comparison of Decisions Having Positive and Negative Features
Making a decision is often a matter of listing and comparing positive and negative arguments. In such cases, the evaluation scale for decisions should be considered bipolar, that ...
Didier Dubois, Hélène Fargier, Jean-...
94
Voted
IJRR
2006
110views more  IJRR 2006»
15 years 22 days ago
Optimal Mass Distribution for Passivity-Based Bipedal Robots
This paper reports how and to what extent the mass distribution of a passive dynamic walker can be tuned to maximize walking speed and stability. An exploration of the complete pa...
Joachim Haß, J. Michael Herrmann, Theo Geise...
« Prev « First page 1490 / 1568 Last » Next »