Sciweavers

204 search results - page 41 / 41
» Towards Autonomic Virtual Applications in the In-VIGO System
Sort
View
VIZSEC
2004
Springer
13 years 10 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
ACSC
2002
IEEE
13 years 10 months ago
Intelligent Agents for Automated One-to-Many e-Commerce Negotiation
Negotiation is a process in which two or more parties with different criteria, constraints, and preferences, jointly reach an agreement on the terms of a transaction. Many current...
Iyad Rahwan, Ryszard Kowalczyk, H. H. Pham
MICRO
2007
IEEE
128views Hardware» more  MICRO 2007»
13 years 11 months ago
A Framework for Providing Quality of Service in Chip Multi-Processors
The trends in enterprise IT toward service-oriented computing, server consolidation, and virtual computing point to a future in which workloads are becoming increasingly diverse i...
Fei Guo, Yan Solihin, Li Zhao, Ravishankar Iyer
ICCV
2003
IEEE
14 years 6 months ago
Statistical Background Subtraction for a Mobile Observer
Statistical background modelling and subtraction has proved to be a popular and effective class of algorithms for segmenting independently moving foreground objects out from a sta...
Eric Hayman, Jan-Olof Eklundh