Sciweavers

2337 search results - page 374 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
CIKM
2003
Springer
14 years 2 months ago
Queueing analysis of relational operators for continuous data streams
Currently, stream data processing is an active area of research, which includes everything from algorithms and architectures for stream processing to modelling and analysis of var...
Qingchun Jiang, Sharma Chakravarthy
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
14 years 3 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
DAGSTUHL
1996
13 years 10 months ago
A Uniform Approach for Compile-Time and Run-Time Specialization
As partial evaluation gets more mature, it is now possible to use this program transformation technique to tackle realistic languages and real-size application programs. However, t...
Charles Consel, Luke Hornof, François No&eu...
AROBOTS
2007
129views more  AROBOTS 2007»
13 years 9 months ago
Behaviors for physical cooperation between robots for mobility improvement
— A team of small, low-cost robots instead of a single large, complex robot is useful in operations such as search and rescue, urban exploration etc. However, the performance of ...
Ashish Deshpande, Jonathan E. Luntz
ACMACE
2009
ACM
13 years 6 months ago
Dramaturgies of PLACE: evaluation, embodiment and performance in PLACE-Hampi
This paper examines an extensive user evaluation survey undertaken during an installation of PLACE-Hampi, a custombuilt augmented stereoscopic panoramic interactive cultural herit...
Sarah Kenderdine, Jeffrey Shaw, Anita Kocsis