Sciweavers

979 search results - page 174 / 196
» Developing Dynamic Security Policies
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 3 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
INFOCOM
2000
IEEE
14 years 2 months ago
Differentiated Multimedia Web Services Using Quality Aware Transcoding
—The ability of a web service to provide low-latency access to its contents is constrained by available network bandwidth. It is important for the service to manage available ban...
Surendar Chandra, Carla Schlatter Ellis, Amin Vahd...
ICDCS
1999
IEEE
14 years 2 months ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...
TASE
2008
IEEE
13 years 9 months ago
An Optimization-Based Approach for Design Project Scheduling
Concurrent engineering has been widely used in managing design projects to speed up the design process by concurrently performing multiple tasks. Since the progress of a design tas...
Ming Ni, Peter B. Luh, Bryan Moser
IPPS
2010
IEEE
13 years 7 months ago
Structuring the execution of OpenMP applications for multicore architectures
Abstract--The now commonplace multi-core chips have introduced, by design, a deep hierarchy of memory and cache banks within parallel computers as a tradeoff between the user frien...
François Broquedis, Olivier Aumage, Brice G...