Sciweavers

3121 search results - page 536 / 625
» Information Survivability Control Systems
Sort
View
141
Voted
RAID
2004
Springer
15 years 9 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
ICMI
2003
Springer
131views Biometrics» more  ICMI 2003»
15 years 9 months ago
TorqueBAR: an ungrounded haptic feedback device
Kinesthetic feedback is a key mechanism by which people perceive object properties during their daily tasks – particularly inertial properties. For example, transporting a glass...
Colin Swindells, Alex Unden, Tao Sang
134
Voted
RTAS
1998
IEEE
15 years 8 months ago
Performance Analysis of an RSVP-Capable Router
RSVP is a bandwidth reservation protocol that allows distributed real-time applications such as video-conferencing software to make bandwidth reservations over packetswitched netw...
Tzi-cker Chiueh, Anindya Neogi, Paul A. Stirpe
128
Voted
CCS
2006
ACM
15 years 7 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
153
Voted
CONEXT
2009
ACM
15 years 4 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...