Sciweavers

5579 search results - page 980 / 1116
» Context-Awareness in Software Architectures
Sort
View
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
14 years 2 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
14 years 2 months ago
Theory and Evaluation of Human Robot Interactions
Human-robot interaction (HRI) for mobile robots is still in its infancy. Most user interactions with robots have been limited to teleoperation capabilities where the most common i...
Jean Scholtz
HOTOS
2003
IEEE
14 years 2 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
ICPP
2003
IEEE
14 years 2 months ago
Scheduling Algorithms with Bus Bandwidth Considerations for SMPs
The bus that connects processors to memory is known to be a major architectural bottleneck in SMPs. However, both software and scheduling policies for these systems generally focu...
Christos D. Antonopoulos, Dimitrios S. Nikolopoulo...
ISMAR
2003
IEEE
14 years 2 months ago
Herding Sheep: Live System Development for Distributed Augmented Reality
In the past, architectures of Augmented Reality systems have been widely different and taylored to specific tasks. In this paper, we use the example of the SHEEP game to show how...
Asa MacWilliams, Christian Sandor, Martin Wagner, ...