Sciweavers

1774 search results - page 287 / 355
» Modeling and implementing software architecture with acme an...
Sort
View
SAC
2004
ACM
14 years 2 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
MM
1993
ACM
126views Multimedia» more  MM 1993»
14 years 1 months ago
CMIFed: A Presentation Environment for Portable Hypermedia Documents
as a tree which specifies the presentation in an abstract, machineindependent way. This specification is created and edited using an authoring system; it is mapped to a particula...
Guido van Rossum, Jack Jansen, K. Sjoerd Mullender...
VAST
2004
ACM
14 years 2 months ago
Digital reconstruction of the Arrigo VII funerary complex
The results of a project aimed to the study, reconstruction and presentation to the public of a monument disassembled and dispersed, the mausoleum of the emperor Arrigo VII, are p...
Clara Baracchini, Antonio Brogi, Marco Callieri, L...
SAC
2011
ACM
12 years 11 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
GIS
2010
ACM
13 years 7 months ago
Towards location-based social networking services
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...
Chi-Yin Chow, Jie Bao 0003, Mohamed F. Mokbel