Sciweavers

1982 search results - page 156 / 397
» New Products
Sort
View
ACSAC
2006
IEEE
14 years 3 months ago
Automatic Evaluation of Intrusion Detection Systems
An Intrusion Detection System (IDS) is a crucial element of a network security posture. Although there are many IDS products available, it is rather difficult to find information ...
Frédéric Massicotte, François...
MICRO
2006
IEEE
74views Hardware» more  MICRO 2006»
14 years 3 months ago
Phoenix: Detecting and Recovering from Permanent Processor Design Bugs with Programmable Hardware
Although processor design verification consumes ever-increasing resources, many design defects still slip into production silicon. In a few cases, such bugs have caused expensive...
Smruti R. Sarangi, Abhishek Tiwari, Josep Torrella...
ACMICEC
2006
ACM
152views ECommerce» more  ACMICEC 2006»
14 years 3 months ago
Capacity allocation with competitive retailers
This paper addresses a problem in supply chain management that how scarce resources can be efficiently allocated among competing interests. We present a formal model of allocation...
Masabumi Furuhata, Dongmo Zhang
IAT
2005
IEEE
14 years 2 months ago
Using Similarity Measures for an Efficient Business Information-Exchange
Several problems are involved in the Virtual Enterprise (VE) formation process. One of the most important problems is the lack of understanding that may arise during agents’ int...
Andreia Malucelli, Eugénio C. Oliveira
MM
2004
ACM
94views Multimedia» more  MM 2004»
14 years 2 months ago
Planet usher: an interactive home movie
This essay investigates the peculiar situation of a new media project which takes as its raw material the home-video archive of a deaf man gone blind. In an attempt to revive this...
Patrick Tarrant