Sciweavers

2237 search results - page 397 / 448
» Storing information with extractors
Sort
View
DFN
2003
13 years 9 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
WICSA
2001
13 years 9 months ago
A Highly-Extensible, XML-Based Architecture Description Language
Software architecture research focuses on models of software architectures as specified in architecture description languages (ADLs). As research progresses in specific areas of s...
Eric M. Dashofy, André van der Hoek, Richar...
USITS
1997
13 years 9 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz
HPDC
2010
IEEE
13 years 8 months ago
Scalability of communicators and groups in MPI
As the number of cores inside compute clusters continues to grow, the scalability of MPI (Message Passing Interface) is important to ensure that programs can continue to execute o...
Humaira Kamal, Seyed M. Mirtaheri, Alan Wagner
HUC
2010
Springer
13 years 8 months ago
Remarkable objects: supporting collaboration in a creative environment
(a) (b) Figure 1: (a) CAM running on an iPhone; (b) Reading a design sketch using Microsoft's TagReader client. In this paper, we report the results of a field trial of a Ubi...
Dhaval Vyas, Anton Nijholt, Dirk Heylen, Alexander...