Sciweavers

213 search results - page 19 / 43
» presence 2000
Sort
View
DIAU
2000
Springer
13 years 12 months ago
On Pseudonymization of Audit Data for Intrusion Detection
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Joachim Biskup, Ulrich Flegel
ECOOP
2000
Springer
13 years 12 months ago
Empirical Study of Object-Layout Strategies and Optimization Techniques
Althoughthereisalargebodyofresearchonthetimeoverheadofobject oriented programs, there is little work on memory overhead. This paper takes an empirical approach to the study of this...
Natalie Eckel, Joseph Gil
EDO
2000
Springer
13 years 11 months ago
Using Model Checking to Detect Deadlocks in Distributed Object Systems
Abstract. We demonstratehow the use of synchronizationprimitives and threading policies in distributed object middleware can lead to deadlocks. We identify that objectmiddleware on...
Nima Kaveh
IFIPTCS
2000
13 years 11 months ago
Open Ended Systems, Dynamic Bisimulation and Tile Logic
Abstract The sos formats ensuring that bisimilarity is a congruence often fail in the presence of structural axioms on the algebra of states. Dynamic bisimulation, introduced to ch...
Roberto Bruni, Ugo Montanari, Vladimiro Sassone
MICAI
2000
Springer
13 years 11 months ago
Detection and Tracking of Facial Features in Video Sequences
This work presents a real time system for detection and tracking of facial features in video sequences. Such system may be used in visual communication applications, such as teleco...
Rogério Schmidt Feris, Teófilo Em&ia...