Sciweavers

3168 search results - page 486 / 634
» Computing Event Dependencies in System Designs and Programs
Sort
View
CG
2000
Springer
15 years 5 months ago
Sketching space
In this paper we present a sketch modelling system which we call Stilton. The program resembles a desktop VRML browser, allowing a user to navigate a 3D model in a perspective pro...
Alasdair Turner, David Chapman, Alan Penn
WIMOB
2007
IEEE
15 years 11 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
RAID
2005
Springer
15 years 11 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...
PAKDD
2010
ACM
167views Data Mining» more  PAKDD 2010»
15 years 9 months ago
Resource-Bounded Information Extraction: Acquiring Missing Feature Values on Demand
We present a general framework for the task of extracting specific information “on demand” from a large corpus such as the Web under resource-constraints. Given a database wit...
Pallika Kanani, Andrew McCallum, Shaohan Hu
NSDI
2010
15 years 7 months ago
Contracts: Practical Contribution Incentives for P2P Live Streaming
PPLive is a popular P2P video system used daily by millions of people worldwide. Achieving this level of scalability depends on users making contributions to the system, but curre...
Michael Piatek, Arvind Krishnamurthy, Arun Venkata...