Sciweavers

929 search results - page 180 / 186
» Personal information management with SEMEX
Sort
View
CCS
2004
ACM
14 years 27 days ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu
CCS
2004
ACM
14 years 27 days ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
EMSOFT
2004
Springer
14 years 26 days ago
Using resource reservation techniques for power-aware scheduling
Minimizing energy consumption is an important issue in the design of real-time embedded systems. As many embedded systems are powered by rechargeable batteries, the goal is to ext...
Claudio Scordino, Giuseppe Lipari
HAPTICS
2003
IEEE
14 years 23 days ago
Validity of Haptic Cues and Its Effect on Priming Visual Spatial Attention
This study investigated cross-modal links in attention between haptics and vision. A visual change-detection task was used as a measure of visual attention. Haptic taps on the bac...
J. Jay Young, Hong Z. Tan, Rob Gray
ERLANG
2003
ACM
14 years 22 days ago
A study of Erlang ETS table implementations and performance
The viability of implementing an in-memory database, Erlang ETS, using a relatively-new data structure, called a Judy array, was studied by comparing the performance of ETS tables...
Scott Lystig Fritchie