Sciweavers

1963 search results - page 294 / 393
» How is aliasing used in systems software
Sort
View
HICSS
2005
IEEE
169views Biometrics» more  HICSS 2005»
14 years 2 months ago
Developing E-Government Integrated Infrastructures: A Case Study
The Public Domain (PD) always serves as an agent to provide better and reliable services and information to citizens. Recent advancements in technology, citizen-demand and new pub...
Marinos Themistocleous, Zahir Irani, Peter E. D. L...
IPCCC
2006
IEEE
14 years 3 months ago
Optimising malware
In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
José M. Fernandez, Pierre-Marc Bureau
DLS
2005
122views Languages» more  DLS 2005»
13 years 11 months ago
Language constructs for context-oriented programming: an overview of ContextL
ContextL is an extension to the Common Lisp Object System that allows for Context-oriented Programming. It provides means to associate partial class and method definitions with l...
Pascal Costanza, Robert Hirschfeld
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 7 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
COMPUTER
1998
119views more  COMPUTER 1998»
13 years 9 months ago
Virtual Memory: Issues of Implementation
ion layer3,4 hides hardware particulars from the higher levels of software but can also compromise performance and compatibility; the higher levels of software often make unwitting...
Bruce L. Jacob, Trevor N. Mudge