Sciweavers

236 search results - page 30 / 48
» Can You Trust Software Capability Evaluations
Sort
View
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
14 years 3 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
AUIC
2006
IEEE
14 years 3 months ago
A framework for interactive web-based visualization
As the power of end user web browsers increases, the delivery of sophisticated visualizations of information via the web becomes possible. However no technology exists that offers...
Nathan Holmberg, Burkhard Wünsche, Ewan D. Te...
WSC
2000
13 years 11 months ago
Optimizing production work flow using OpEMCSS
A graphical discrete event simulation library is proposed for system simulation that is based on interacting concurrent processes. This library works with EXTEND (Imagine That Inc...
John R. Clymer
CGO
2003
IEEE
14 years 3 months ago
Dynamic Binary Translation for Accumulator-Oriented Architectures
A dynamic binary translation system for a co-designed virtual machine is described and evaluated. The underlying hardware directly executes an accumulator-oriented instruction set...
Ho-Seop Kim, James E. Smith
AVI
2006
13 years 11 months ago
Distributed intelligence: extending the power of the unaided, individual human mind
The history of the human race is one of increasing intellectual capability. Since the time of our early ancestors, our brains have gotten no bigger; nevertheless, there has been a...
Gerhard Fischer