Sciweavers

4303 search results - page 829 / 861
» Are We There Yet
Sort
View
98
Voted
IPPS
2007
IEEE
15 years 7 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel
TPHOL
2007
IEEE
15 years 7 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao
116
Voted
ATAL
2007
Springer
15 years 7 months ago
The human agent virtual environment
In this paper we describe a multi-agent simulation called the Human Agent Virtual Environment (or HAVE). HAVE is a test bed to explore agent-environment interaction in multiagent ...
Michael Papasimeon, Adrian R. Pearce, Simon Goss
120
Voted
BIOWIRE
2007
Springer
15 years 7 months ago
Bio-Inspired Multi-agent Collaboration for Urban Monitoring Applications
Vehicular sensor networks (VSNs) provide a collaborative sensing environment where mobile vehicles equipped with sensors of different nature (from chemical detectors to still/video...
Uichin Lee, Eugenio Magistretti, Mario Gerla, Paol...
86
Voted
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 7 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp