Sciweavers

VEE
2006
ACM
115views Virtualization» more  VEE 2006»
14 years 5 days ago
Live updating operating systems using virtualization
Many critical IT infrastructures require non-disruptive operations. However, the operating systems thereon are far from perfect that patches and upgrades are frequently applied, i...
Haibo Chen, Rong Chen, Fengzhe Zhang, Binyu Zang, ...
SAC
2006
ACM
14 years 5 days ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
EUROSYS
2006
ACM
14 years 5 days ago
K42: building a complete operating system
K42 is one of the few recent research projects that is examining operating system design structure issues in the context of new whole-system design. K42 is open source and was des...
Orran Krieger, Marc A. Auslander, Bryan S. Rosenbu...
ASPLOS
2006
ACM
14 years 6 days ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
ISDA
2006
IEEE
14 years 7 days ago
Enhancing 3D Face Recognition By Mimics Segmentation
In this paper, we present a novel approach for face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity image...
Boulbaba Ben Amor, Mohsen Ardabilian, Liming Chen
ISDA
2006
IEEE
14 years 7 days ago
Efficient Multiplier over Finite Field Represented in Type II Optimal Normal Basis
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
Youbo Wang, Zhiguang Tian, Xinyan Bi, Zhendong Niu
ISDA
2006
IEEE
14 years 7 days ago
Modular Neural Network Task Decomposition Via Entropic Clustering
The use of monolithic neural networks (such as a multilayer perceptron) has some drawbacks: e.g. slow learning, weight coupling, the black box effect. These can be alleviated by t...
Jorge M. Santos, Luís A. Alexandre, Joaquim...
ISDA
2006
IEEE
14 years 7 days ago
From Gene to Drug: A Proof of Concept for a Plausible Computational Pathway
The last decade has witnessed an exponential growth of sequence information in the field of biological macromolecules such as proteins and nucleic acids and their interactions wit...
Sandhya Shenoy, B. Jayaram, N. Latha, Pooja Narang...
ISDA
2006
IEEE
14 years 7 days ago
New developments of the Z-EDM algorithm
In this paper we address some open questions on the recently proposed Zero-Error Density Maximization algorithm for MLP training. We propose a new version of the cost function tha...
Luís M. Silva, Joaquim Marques de Sá...
ISDA
2006
IEEE
14 years 7 days ago
Finding Groups in Data: Cluster Analysis with Ants
We present in this paper a modification of Lumer and Faieta’s algorithm for data clustering. This algorithm discovers automatically clusters in numerical data without prior kno...
Urszula Boryczka