Sciweavers

1266 search results - page 20 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IJCAT
2007
102views more  IJCAT 2007»
13 years 7 months ago
Synchronous collaborative systems for distributed virtual environments in Java
: This paper presents a 3D-distributed virtual environment, which allows for the creation of applications to enable multiple users to collaboratively interact in, and communicate a...
Kevin Gorman, Daneyand Singley, Yuichi Motai
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
HRI
2006
ACM
14 years 1 months ago
Daily HRI evaluation at a classroom environment: reports from dance interaction experiments
The design and development of social robots that interact and assist people in daily life requires moving into unconstrained daily-life environments. This presents unexplored meth...
Fumihide Tanaka, Javier R. Movellan, Bret Fortenbe...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 7 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
CCGRID
2008
IEEE
14 years 1 months ago
Scalable Data Gathering for Real-Time Monitoring Systems on Distributed Computing
Real-time monitoring is increasingly becoming important in various scenes of large scale, multi-site distributed/parallel computing, e.g, understanding behavior of systems, schedu...
Yoshikazu Kamoshida, Kenjiro Taura