Sciweavers

476 search results - page 75 / 96
» iOPEN Network: Operation Mechanisms and Experimental Study
Sort
View
129
Voted
SENSYS
2010
ACM
14 years 10 months ago
Privacy-aware regression modeling of participatory sensing data
Many participatory sensing applications use data collected by participants to construct a public model of a system or phenomenon. For example, a health application might compute a...
Hossein Ahmadi, Nam Pham, Raghu K. Ganti, Tarek F....
NDSS
2009
IEEE
15 years 7 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
SPE
2002
141views more  SPE 2002»
15 years 2 days ago
Data collection and restoration for heterogeneous process migration
This study presents a practical solution for data collection and restoration to migrate a process written in high level stack-based languages such as C and Fortran over a network ...
Kasidit Chanchio, Xian-He Sun
JUCS
2010
150views more  JUCS 2010»
14 years 11 months ago
SOM Clustering to Promote Interoperability of Directory Metadata: A Grid-Enabled Genetic Algorithm Approach
: Directories provide a general mechanism for describing resources and enabling information sharing within and across organizations. Directories must resolve differing structures a...
Lei Li, Vijay K. Vaishnavi, Art Vandenberg
121
Voted
PERCOM
2005
ACM
16 years 1 days ago
Efficient Browsing of Web Search Results on Mobile Devices Based on Block Importance Model
It is expected that more and more people will search the web when they are on the move. Though conventional search engines can be directly visited from mobile devices with web bro...
Xing Xie, Gengxin Miao, Ruihua Song, Ji-Rong Wen, ...