Sciweavers

1733 search results - page 282 / 347
» Self-Similarity in File Systems
Sort
View
VRML
1998
ACM
14 years 2 months ago
Towards More Realistic Sound in VRML
While many pleasing effects are possible using the current VRML sound model [9], it falls short of producing convincing aural environments. Sound sources are not easily affected b...
Sean Ellis
ASPLOS
1996
ACM
14 years 2 months ago
Reducing Network Latency Using Subpages in a Global Memory Environment
New high-speed networks greatly encourage the use of network memory as a cache for virtual memory and file pages, thereby reducing the need for disk access. Becausepages are the f...
Hervé A. Jamrozik, Michael J. Feeley, Geoff...
VLDB
1994
ACM
115views Database» more  VLDB 1994»
14 years 1 months ago
Database Graph Views: A Practical Model to Manage Persistent Graphs
Advanced technical applications like routing systems or electrical network managementsystems introduce the need for complex manipulations of large size graphs. Efficiently support...
Alejandro Gutiérrez, Philippe Pucheral, Her...
ACSAC
2006
IEEE
14 years 1 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
AWIC
2004
Springer
14 years 1 months ago
Attribute Reduction for Effective Intrusion Detection
Abstract. Computer intrusion detection is to do with identifying computer activities that may compromise the integrity, confidentiality or the availability of an IT system. Anomaly...
Fernando Godínez, Dieter Hutter, Raul Monro...