Sciweavers

7811 search results - page 1353 / 1563
» computing 2004
Sort
View
127
Voted
PDCN
2004
15 years 5 months ago
Implementing a secure setuid program
Setuid programs are often exploited by malicious attackers to obtain unauthorized access to local systems. Setuid programs, especially owned by the root user, are granted root pri...
Takahiro Shinagawa, Kenji Kono
128
Voted
PDPTA
2004
15 years 5 months ago
A Case for Queue-to-Queue, Back-Pressure-Based Congestion Control for Grid Networks
Standard "new-Reno" TCP faces some performance limitations in very high throughput IP WAN networks, (e.g., computing grids) due to a long end-to-end congestion feedback l...
Marc Herbert, Pascale Vicat-Blanc Primet
120
Voted
PDPTA
2004
15 years 5 months ago
Agent-Based Embedded Monitoring System for Ubiquitous Networks Environments
Contrary to current wireless network systems, ubiquitous network environment has quite dynamic and diversified devices which aim at best meeting the requirements of specific group ...
Hyo-Sung Kang, Jong-Mu Choi, Jai-Hoon Kim, Young-B...
PRIS
2004
15 years 5 months ago
Pattern Recognition Algorithms for Polyphonic Music Transcription
Abstract. The main area of work in computer music related to information systems is known as music information retrieval (MIR). Databases containing musical information can be clas...
Antonio Pertusa, José Manuel Iñesta ...
PRIS
2004
15 years 5 months ago
Similarity Range Queries in Streaming Time Series
Similarity search in time series databases is an important research direction. Several methods have been proposed in order to provide algorithms for efficient query processing in t...
Maria Kontaki, Apostolos Papadopoulos, Yannis Mano...
« Prev « First page 1353 / 1563 Last » Next »