Sciweavers

1774 search results - page 287 / 355
» Modeling and implementing software architecture with acme an...
Sort
View
SAC
2004
ACM
15 years 8 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
MM
1993
ACM
126views Multimedia» more  MM 1993»
15 years 7 months ago
CMIFed: A Presentation Environment for Portable Hypermedia Documents
as a tree which specifies the presentation in an abstract, machineindependent way. This specification is created and edited using an authoring system; it is mapped to a particula...
Guido van Rossum, Jack Jansen, K. Sjoerd Mullender...
VAST
2004
ACM
15 years 8 months ago
Digital reconstruction of the Arrigo VII funerary complex
The results of a project aimed to the study, reconstruction and presentation to the public of a monument disassembled and dispersed, the mausoleum of the emperor Arrigo VII, are p...
Clara Baracchini, Antonio Brogi, Marco Callieri, L...
SAC
2011
ACM
14 years 6 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
GIS
2010
ACM
15 years 1 months ago
Towards location-based social networking services
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...
Chi-Yin Chow, Jie Bao 0003, Mohamed F. Mokbel