Sciweavers

6137 search results - page 1049 / 1228
» Securing Collaborative Applications
Sort
View
CAINE
2008
13 years 11 months ago
A Graphics-User Interface in Support of a Cognitive Inference Architecture
- The objective of this paper is to present a graphical-user-interface (GUI) in support of a decision support system (KASER) for machine understanding. In order to provide informat...
Isai Michel Lombera, Jayeshkumar Patel, Stuart Har...
MASCOTS
2010
13 years 11 months ago
RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage
Recording raw network traffic for long-term periods can be extremely beneficial for a multitude of monitoring and security applications. However, storing all traffic of high volume...
Antonis Papadogiannakis, Michalis Polychronakis, E...
GCA
2007
13 years 11 months ago
Transparent File Protection in On-Demand Computing
On-Demand Computing fulfills the need of computing availability at limited hardware and software costs. Distributed systems of this kind typically store user files in a shared ...
Fabio Dellutri, Salvatore Di Blasi, Giuseppe F. It...
PST
2008
13 years 11 months ago
LogView: Visualizing Event Log Clusters
Event logs or log files form an essential part of any network management and administration setup. While log files are invaluable to a network administrator, the vast amount of dat...
Adetokunbo Makanju, Stephen Brooks, A. Nur Zincir-...
AAAI
2004
13 years 11 months ago
Visibility-Based Pursuit-Evasion with Limited Field of View
We study a form of the pursuit-evasion problem, in which one or more searchers must move through a given environment so as to guarantee detection of any and all evaders, which can...
Brian P. Gerkey, Sebastian Thrun, Geoffrey J. Gord...
« Prev « First page 1049 / 1228 Last » Next »