Sciweavers

12637 search results - page 138 / 2528
» Security for Extensible Systems
Sort
View
255
Voted
C5
2004
IEEE
15 years 6 months ago
Design for an Extensible Croquet-Based Framework to Deliver a Persistent, Unified, Massively Multi-User, and Self-Organizing Vir
We describe a design for a collaborative Virtual Learning Environment (VLE) to support massively multi-user and multi-institutional learning communities. This architecture extends...
Mark P. McCahill, Julian Lombardi
IC
2003
15 years 4 months ago
Extensions of Magic Square Using Recovery Nodes Against Node Failures
Magic Square is a ppeer-to-peer protocol for searching resources. The recovery cost of Magic Square is high and the system doesn’t recover the failure in simultaneous neighbor n...
Hyun-ju Lee, Il-dong Jung, Young-song Son, Kyongso...
ICIP
1994
IEEE
16 years 4 months ago
On Symmetric Extensions, Orthogonal Transforms of Images, and Paraunitary Filter Banks
Periodic or symmetric extensions are commonly used for processing images and other finitelength signals with a paraunitary Alter bank (PUFB).Unlike infinite-length signals, PUFBs ...
Ricardo L. de Queiroz, K. Raghunath Rao
104
Voted
SAMOS
2004
Springer
15 years 8 months ago
Using CoDeL to Rapidly Prototype Network Processsor Extensions
Abstract. The focus of this work is on techniques that promise to reduce the message delivery latency in message passing environments, incuding clusters of workstations or SMPs. We...
Nainesh Agarwal, Nikitas J. Dimopoulos
SOFTCOMP
2010
15 years 29 days ago
Approaching Real-Time Intrusion Detection through MOVICAB-IDS
Abstract This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time proces...
Martí Navarro, Álvaro Herrero, Emili...