Sciweavers

12637 search results - page 63 / 2528
» Security for Extensible Systems
Sort
View
AGENTS
2001
Springer
15 years 7 months ago
CMPack: a complete software system for autonomous legged soccer robots
This paper describes a completely implemented, fully autonomous software system for soccer playing quadruped robots. The system includes real-time color vision, probabilistic loca...
Scott Lenser, James Bruce, Manuela M. Veloso
135
Voted
CCGRID
2005
IEEE
15 years 8 months ago
Scaling NFSv4 with parallel file systems
Large grid installations require global access to massive data stores. Parallel file systems give high throughput within a LAN, but cross-site data transfers lack seamless integra...
Dean Hildebrand, Peter Honeyman
110
Voted
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 2 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
ACSAC
2004
IEEE
15 years 6 months ago
Detecting Exploit Code Execution in Loadable Kernel Modules
In current extensible monolithic operating systems, loadable kernel modules (LKM) have unrestricted access to all portions of kernel memory and I/O space. As a result, kernel-modu...
Haizhi Xu, Wenliang Du, Steve J. Chapin
143
Voted
CMS
2003
120views Communications» more  CMS 2003»
15 years 3 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...