Sciweavers

3979 search results - page 3 / 796
» Wild control operators
Sort
View
WWW
2006
ACM
16 years 10 days ago
XPath filename expansion in a Unix shell
Locating files based on file system structure, file properties, and maybe even file contents is a core task of the user interface of operating systems. By adapting XPath's po...
Kaspar Giger, Erik Wilde
75
Voted
CCS
2008
ACM
15 years 1 months ago
Rootkit-resistant disks
Rootkits are now prevalent in the wild. Users affected by rootkits are subject to the abuse of their data and resources, often unknowingly. Such malware becomes even more dangerou...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...
INFOCOM
2007
IEEE
15 years 6 months ago
Packet Loss Characterization in WiFi-Based Long Distance Networks
— Despite the increasing number of WiFi-based Long Distance (WiLD) network deployments, there is a lack of understanding of how WiLD networks perform in practice. In this paper, ...
Anmol Sheth, Sergiu Nedevschi, Rabin K. Patra, Son...
BIODATAMINING
2008
163views more  BIODATAMINING 2008»
14 years 11 months ago
Multivariate profiling of neurodegeneration-associated changes in a subcellular compartment of neurons via image processing
Background: Dysfunction in the endolysosome, a late endosomal to lysosomal degradative intracellular compartment, is an early hallmark of some neurodegenerative diseases, in parti...
Saravana K. Kumarasamy, Yunshi Wang, Vignesh Viswa...
59
Voted
ACMACE
2004
ACM
15 years 5 months ago
Optimizing returns in the gaming industry for players and operators of Video Poker machines
Video Poker in Australia is on the verge of extinction. These machines are being replaced in casinos as it is claimed they generate less money than the traditional slot machines. ...
Tristan Barnett, Stephen R. Clarke