Sciweavers

1266 search results - page 248 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
CCS
2005
ACM
14 years 26 days ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
ISI
2005
Springer
14 years 25 days ago
Information Supply Chain: A Unified Framework for Information-Sharing
To balance demand and supply of information, we propose a framework called “information supply chain” (ISC). This framework is based on supply chain management (SCM), which has...
Shuang Sun, John Yen
AROBOTS
2008
134views more  AROBOTS 2008»
13 years 7 months ago
Mobile manipulators for assisted living in residential settings
Abstract: We describe a methodology for creating new technologies for assisted living in residential environments. The number of eldercare clients is expected to grow dramatically ...
Patrick Deegan, Roderic A. Grupen, Allen R. Hanson...
SIGSOFT
2002
ACM
14 years 8 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
ICPADS
2007
IEEE
14 years 1 months ago
A scheduling algorithm for revenue maximisation for cluster-based Internet services
This paper proposes a new priority scheduling algorithm to maximise site revenue of session-based multi-tier Internet services in a multicluster environment. This research is part...
James Wen Jun Xue, Ligang He, Stephen A. Jarvis