Sciweavers

5339 search results - page 878 / 1068
» Controllable Delay-Insensitive Processes
Sort
View
SDMW
2005
Springer
15 years 10 months ago
Metadata Management in Outsourced Encrypted Databases
Abstract. Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client’s database is stored at an external servi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
SELMAS
2005
Springer
15 years 10 months ago
Characterization and Evaluation of Multi-agent System Architectural Styles
We argue that it is useful to study classes of Multi-Agent System (MAS) architectures, corresponding to architectural styles in addition to particular tures. In this work we focus ...
Paul Davidsson, Stefan J. Johansson, Mikael Svahnb...
VIZSEC
2005
Springer
15 years 10 months ago
A Visualization Methodology for Characterization of Network Scans
Many methods have been developed for monitoring network traffic, both using visualization and statistics. Most of these methods focus on the detection of suspicious or malicious ...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
AFRIGRAPH
2004
ACM
15 years 10 months ago
Designing a VR interaction authoring tool using constructivist practices
This paper describes the process of designing an authoring tool for virtual environments, using constructivist principles. The focus of the tool is on helping novice designers wit...
Cara Winterbottom, Edwin H. Blake
MM
2004
ACM
191views Multimedia» more  MM 2004»
15 years 10 months ago
SwarmArt: interactive art from swarm intelligence
This paper describes SwarmArt, a collaborative project between computer science and art, which resulted in two installations of interactive art that incorporates swarm intelligenc...
Jeffrey E. Boyd, Gerald Hushlak, Christian Jacob