Sciweavers

7778 search results - page 264 / 1556
» Designing Controllers for Reachability
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan
CLUSTER
2000
IEEE
15 years 8 months ago
Design and Performance of Maestro Cluster Network
Most clusters so far have used WAN or LAN-based network products for communication due to their market availability. However, they do not always match communication patterns in cl...
Shinichi Yamagiwa, Munehiro Fukuda, Koichi Wada
AGP
1998
IEEE
15 years 8 months ago
Some Design Issues in the Visualization of Constraint Logic Program Execution
Visualization of program executions has been found useful in applications which include education and debugging. However, traditional visualization techniques often fall short of ...
Manuel Carro, Manuel V. Hermenegildo
CGF
2010
105views more  CGF 2010»
15 years 4 months ago
Visibility Editing For All-Frequency Shadow Design
We present an approach for editing shadows in all-frequency lighting environments. To support artistic control, we propose to decouple shadowing from lighting and focus on providi...
Juraj Obert, Fabio Pellacini, Sumanta N. Pattanaik
RTSS
2007
IEEE
15 years 10 months ago
The Design of an EDF-Scheduled Resource-Sharing Open Environment
We study the problem of executing a collection of independently designed and validated task systems upon a common comprised of a preemptive processor and additional shared resourc...
Nathan Fisher, Marko Bertogna, Sanjoy K. Baruah