Sciweavers

4923 search results - page 946 / 985
» Software Risk Management
Sort
View
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
14 years 1 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
RSP
2005
IEEE
164views Control Systems» more  RSP 2005»
14 years 1 months ago
High Level Synthesis for Data-Driven Applications
Abstract— John von Neumann proposed his famous architecture in a context where hardware was very expensive and bulky. His goal was to maximize functionality with minimal hardware...
Etienne Bergeron, Xavier Saint-Mleux, Marc Feeley,...
SACMAT
2005
ACM
14 years 1 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang
SIGUCCS
2005
ACM
14 years 1 months ago
Developing a synchronous web seminar application for online learning
Many higher education institutions are searching for cost effective tools for the delivery of a feature rich, synchronous online learning environment. While there are several comm...
Michael D. Ciocco, Neil Toporski, Michael Dorris
UIST
2005
ACM
14 years 1 months ago
eyeLook: using attention to facilitate mobile media consumption
One of the problems with mobile media devices is that they may distract users during critical everyday tasks, such as navigating the streets of a busy city. We addressed this issu...
Connor Dickie, Roel Vertegaal, Changuk Sohn, Danie...