Sciweavers

7778 search results - page 1478 / 1556
» Designing Controllers for Reachability
Sort
View
IWIA
2005
IEEE
15 years 7 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
ACMACE
2005
ACM
15 years 7 months ago
Possession techniques for interaction in real-time strategy augmented reality games
There have been a number of interactive games created for Augmented Reality (AR) environments. In this paper, interaction techniques to support Real-Time Strategy (RTS) games in A...
Keith Phillips, Wayne Piekarski
MSR
2005
ACM
15 years 7 months ago
Collaboration using OSSmole: a repository of FLOSS data and analyses
This paper introduces a collaborative project OSSmole which collects, shares, and stores comparable data and analyses of free, libre and open source software (FLOSS) development f...
Megan Conklin, James Howison, Kevin Crowston
PLDI
2005
ACM
15 years 7 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
SENSYS
2005
ACM
15 years 7 months ago
Estimating clock uncertainty for efficient duty-cycling in sensor networks
Radio duty cycling has received significant attention in sensor networking literature, particularly in the form of protocols for medium access control and topology management. Whi...
Saurabh Ganeriwal, Deepak Ganesan, Hohyun Shim, Vl...
« Prev « First page 1478 / 1556 Last » Next »