Sciweavers

983 search results - page 157 / 197
» A Better Update Policy
Sort
View
CHIMIT
2007
ACM
14 years 24 days ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
EUC
2006
Springer
14 years 14 days ago
Optimizing Scheduling Stability for Runtime Data Alignment
Runtime data alignment has been paid attention recently since it can allocate data segment to processors dynamically according to applications' requirement. One of the key opt...
Ching-Hsien Hsu, Chao-Yang Lan, Shih-Chang Chen
USENIX
2008
13 years 11 months ago
ConfiDNS: Leveraging Scale and History to Detect Compromise
While cooperative DNS resolver systems, such as CoDNS, have demonstrated improved reliability and performance over standard approaches, their security has been weaker, since any c...
Lindsey Poole, Vivek S. Pai
WSC
2008
13 years 11 months ago
Simulating culture: An experiment using a multi-user virtual environment
With increased levels of global trade, foreign policy making, foreign travel, and distance collaboration using the Internet, the issue of culture takes center stage. One needs to ...
Paul A. Fishwick, Julie Henderson, Elinore Fresh, ...
WSC
2008
13 years 11 months ago
Yard crane dispatching based on real time data driven simulation for container terminals
This paper studies the problem of real time yard crane dispatching in container terminals. Many technologies, including transponders, RFID and GPS have been used in the container ...
Xi Guo, Shell-Ying Huang, Wen-Jing Hsu, Malcolm Yo...