Sciweavers

2913 search results - page 159 / 583
» How Much to Copy
Sort
View
ACSAC
2003
IEEE
14 years 4 months ago
A Failure to Learn from the Past
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Eugene H. Spafford
ACSAC
2003
IEEE
14 years 4 months ago
Security Design in Online Games
The emergence of online games has fundamentally changed security requirements for computer games, which previously were largely concerned with copy protection. In this paper, we e...
Jeff Jianxin Yan
MSS
2003
IEEE
100views Hardware» more  MSS 2003»
14 years 4 months ago
A Simple Mass Storage System for the SRB Data Grid
The functionality that is provided by Mass Storage Systems can be implemented using data grid technology. Data grids already provide many of the required features, including a log...
Michael Wan, Arcot Rajasekar, Reagan Moore, Phil A...
IPPS
2002
IEEE
14 years 3 months ago
Disconnected Operations in Mobile Environments
The execution of distributed applications involving mobile terminals and fixed servers connected by wireless links raises the need for handling network disconnections, both invol...
Denis Conan, Sophie Chabridon, Guy Bernard
IDA
2009
Springer
14 years 3 months ago
Compensation of Translational Displacement in Time Series Clustering Using Cross Correlation
Although k-means clustering is often applied to time series clustering, the underlying Euclidean distance measure is very restrictive in comparison to the human perception of time ...
Frank Höppner, Frank Klawonn