Sciweavers

5579 search results - page 1016 / 1116
» Context-Awareness in Software Architectures
Sort
View
JUCS
2010
89views more  JUCS 2010»
13 years 7 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
PROCEDIA
2010
80views more  PROCEDIA 2010»
13 years 7 months ago
Visualising spins and clusters in regular and small-world Ising models with GPUs
Visualising computational simulation models of solid state physical systems is a hard problem for dense lattice models. Fly throughs and cutaways can aid viewer understanding of a...
Arno Leist, Daniel P. Playne, Kenneth A. Hawick
RAID
2010
Springer
13 years 7 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 7 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
IAT
2010
IEEE
13 years 7 months ago
Agent Technologies for Space Applications: The DAFA Experience
-- The Distributed Agents For Autonomy (DAFA) study has been performed for ESA/ESTEC by SciSys UK Ltd, VEGA, and Politecnico di Milano in 2008-2009. The aim of DAFA study has been ...
Francesco Amigoni, Andrea Brambilla, Michèl...
« Prev « First page 1016 / 1116 Last » Next »