Sciweavers

294 search results - page 59 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
WISEC
2010
ACM
13 years 10 months ago
Privacy-preserving computation of benchmarks on item-level data using RFID
Currently, companies are about to optimize their internal processes by monitoring items they handle with Radio Frequency Identification (RFID). However, there is a risk that sens...
Florian Kerschbaum, Nina Oertel, Leonardo Weiss Fe...
CCR
2008
101views more  CCR 2008»
13 years 5 months ago
Empirical evaluation of hash functions for multipoint measurements
A broad spectrum of network measurement applications demand passive multipoint measurements in which data from multiple observation points has to be correlated. Examples are the p...
Christian Henke, Carsten Schmoll, Tanja Zseby
SC
2005
ACM
13 years 11 months ago
VSched: Mixing Batch And Interactive Virtual Machines Using Periodic Real-time Scheduling
We are developing Virtuoso, a system for distributed computing using virtual machines (VMs). Virtuoso must be able to mix batch and interactive VMs on the same physical hardware, ...
Bin Lin, Peter A. Dinda
CGF
1998
213views more  CGF 1998»
13 years 5 months ago
Interactive Construction and Animation of Layered Elastically Deformable Characters
An interactive system is described for creating and animating deformable 3D characters. By using a hybrid layered model of kinematic and physics-based components together with an ...
Russell Turner, Enrico Gobbetti