Sciweavers

443 search results - page 50 / 89
» Dynamic Authorization and Intrusion Response in Distributed ...
Sort
View
VRST
2004
ACM
14 years 1 months ago
A CAVE system for interactive modeling of global illumination in car interior
Global illumination dramatically improves realistic appearance of rendered scenes, but usually it is neglected in VR systems due to its high costs. In this work we present an effi...
Kirill Dmitriev, Thomas Annen, Grzegorz Krawczyk, ...
DAC
2007
ACM
14 years 9 months ago
Synthesizing Stochasticity in Biochemical Systems
Randomness is inherent to biochemistry: at each instant, the sequence of reactions that fires is a matter of chance. Some biological systems exploit such randomness, choosing betw...
Brian Fett, Jehoshua Bruck, Marc D. Riedel
CIDR
2003
121views Algorithms» more  CIDR 2003»
13 years 9 months ago
Towards High Performance Peer-to-Peer Content and Resource Sharing Systems
Peer-to-peer sharing systems are becoming increasingly popular and an exciting new class of innovative, internet-based data management systems. In these systems, users contribute ...
Peter Triantafillou, Chryssani Xiruhaki, Manolis K...
SIGCOMM
2009
ACM
14 years 2 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
ITCC
2002
IEEE
14 years 1 months ago
The Object Behavior of Java Object-Oriented Database Management Systems
Due to its portability and popularity for Internet applications, Java has become one of the major programming languages. The similar syntax inherited from the C language and the p...
Chia-Tien Dan Lo, J. Morris Chang, Ophir Frieder, ...