Sciweavers

524 search results - page 91 / 105
» On Multiple Interpretations
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
ICDCS
2005
IEEE
14 years 1 months ago
Network-Centric Buffer Cache Organization
A pass-through server such as an NFS server backed by an iSCSI[1] storage server only passes data between the storage server and NFS clients. Ideally it should require at most one...
Gang Peng, Srikant Sharma, Tzi-cker Chiueh
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
14 years 29 days ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
VISUALIZATION
2005
IEEE
14 years 29 days ago
Fast and Reproducible Fiber Bundle Selection in DTI Visualization
Diffusion Tensor Imaging (DTI) is an MRI-based technique for quantifying water diffusion in living tissue. In the white matter of the brain, water diffuses more rapidly along the ...
Jorik Blaas, Charl P. Botha, Bart Peters, Frans Vo...
MKM
2005
Springer
14 years 27 days ago
An Exploration in the Space of Mathematical Knowledge
Abstract. Although knowledge is a central topic for MKM there is little explicit discussion on what ‘knowledge’ might actually be. There are specific intuitions about form and...
Andrea Kohlhase, Michael Kohlhase