Sciweavers

3424 search results - page 546 / 685
» Building Diverse Computer Systems
Sort
View
ACSAC
2003
IEEE
15 years 9 months ago
Poly2 Paradigm: A Secure Network Service Architecture
General-purpose operating systems provide a rich computing environment both to the user and the attacker. The declining cost of hardware and the growing security concerns of softw...
Eric Bryant, James P. Early, Rajeev Gopalakrishna,...
COOPIS
2003
IEEE
15 years 9 months ago
Profiling and Matchmaking Strategies in Support of Opportunistic Collaboration
With the recent advances in communications technologies and decentralization of work practices, there has been an increase in distributed, remote, computerized work environments. I...
Adriana Santarosa Vivacqua, Melfry Moreno, Jano Mo...
ISWC
2003
IEEE
15 years 9 months ago
First Steps Towards Handheld Augmented Reality
In this paper we describe the first stand-alone Augmented Reality (AR) system with self-tracking running on an unmodified personal digital assistant (PDA) with a commercial camera...
Daniel Wagner, Dieter Schmalstieg
CP
2003
Springer
15 years 9 months ago
Using Constraints for Exploring Catalogs
Abstract. Searching objects within a catalog is a problem of increasing importance, as the general public has access to increasing volumes of data. Constraint programming has addre...
François Laburthe, Yves Caseau
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 8 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...