Results 241 to 250 of about 223,006 (297)
Some of the next articles are maybe not open access.
Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006), 2006
If the hype is to be believed, we have come very close to the realisation of a ubiquitous computing environment. There are already a wide variety of devices, networking technologies and bespoke services; and yet the vision of anywhere anytime computing is proving somewhat elusive.
Mohamed Ahmed +2 more
openaire +2 more sources
If the hype is to be believed, we have come very close to the realisation of a ubiquitous computing environment. There are already a wide variety of devices, networking technologies and bespoke services; and yet the vision of anywhere anytime computing is proving somewhat elusive.
Mohamed Ahmed +2 more
openaire +2 more sources
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Memory forensic analysis collects evidence for digital crimes and malware attacks from the memory of a live system. It is increasingly valuable, especially in cloud computing. However, memory analysis on on commodity operating systems (such as Microsoft Windows) faces the following key challenges: (1) a partial knowledge of kernel data structures; (2 ...
Qian Feng +3 more
openaire +2 more sources
Memory forensic analysis collects evidence for digital crimes and malware attacks from the memory of a live system. It is increasingly valuable, especially in cloud computing. However, memory analysis on on commodity operating systems (such as Microsoft Windows) faces the following key challenges: (1) a partial knowledge of kernel data structures; (2 ...
Qian Feng +3 more
openaire +2 more sources
Proceedings of the 28th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2007
Building distributed systems is particularly difficult because of the asynchronous, heterogeneous, and failure-prone environment where these systemsmust run. Tools for building distributed systems must strike a compromise between reducing programmer effort and increasing system efficiency.
Charles Edwin Killian +4 more
openaire +1 more source
Building distributed systems is particularly difficult because of the asynchronous, heterogeneous, and failure-prone environment where these systemsmust run. Tools for building distributed systems must strike a compromise between reducing programmer effort and increasing system efficiency.
Charles Edwin Killian +4 more
openaire +1 more source
Proceedings of the 2017 ACM Symposium on Document Engineering, 2017
We present a new interface for interactive comparisons of more than two alternative documents in the context of a generative design system that uses generative data-flow networks defined via directed acyclic graphs. To better show differences between such networks, we emphasize added, deleted, (un)changed nodes and edges.
Loutfouz Zaman +2 more
openaire +1 more source
We present a new interface for interactive comparisons of more than two alternative documents in the context of a generative design system that uses generative data-flow networks defined via directed acyclic graphs. To better show differences between such networks, we emphasize added, deleted, (un)changed nodes and edges.
Loutfouz Zaman +2 more
openaire +1 more source
2016
Professor Larkin Farinrolt marches from Butler Library with the mace, in front of President Grayson Kirk, at the 1957 commencement ceremony.
openaire +2 more sources
Professor Larkin Farinrolt marches from Butler Library with the mace, in front of President Grayson Kirk, at the 1957 commencement ceremony.
openaire +2 more sources
Evaluation of the MACE force field architecture: From medicinal chemistry to materials science
Journal of Chemical Physics, 2023Dávid Péter Kovács
exaly
Mace‐Like Plasmonic Au‐Pd Heterostructures Boost Near‐Infrared Photoimmunotherapy
Advanced Science, 2023Yanlin Feng
exaly

