Sciweavers

2178 search results - page 306 / 436
» Toward Systemically Secure IT Architectures
Sort
View
HT
2010
ACM
13 years 8 months ago
Adaptation and search: from Dexter and AHAM to GAF
Adaptive Hypermedia Systems (AHS) have long been concentrating on adaptive guidance of links between domain concepts. Here we show parallels between navigation and linking in adap...
Evgeny Knutov, Paul De Bra, Mykola Pechenizkiy
COMCOM
2007
123views more  COMCOM 2007»
13 years 8 months ago
Seamless transport service selection by deploying a middleware
Despite the many research efforts at the transport layer (SCTP, DCCP, etc.), new innovations in that area hardly ever make it into the TCP/IP stacks of standard end systems. We b...
Sven Hessler, Michael Welzl
SAB
2010
Springer
153views Optimization» more  SAB 2010»
13 years 6 months ago
Attentional Modulation of Mutually Dependent Behaviors
In this paper, we investigate simple attentional mechanisms suitable for sensing rate regulation and action coordination in the presence of mutually dependent behaviors. We present...
Ernesto Burattini, Silvia Rossi, Alberto Finzi, Ma...
CCS
2010
ACM
13 years 8 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps
ISCIS
2003
Springer
14 years 1 months ago
Design of a Log Server for Distributed and Large-Scale Server Environments
Collection, storage and analysis of multiple hosts’ audit trails in a distributed manner are known as a major requirement, as well as a major challenge for enterprise-scale compu...
Attila Özgit, Burak Dayioglu, Erhan Anuk, Ina...