Sciweavers

2686 search results - page 277 / 538
» Parallel object monitors
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 8 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
IEEEARES
2010
IEEE
15 years 8 months ago
Optimising IDS Sensor Placement
—In large network environments multiple intrusion detection sensors are needed to adequately monitor network traffic. However, deploying and managing additional sensors on a lar...
Hao Chen, John A. Clark, Siraj A. Shaikh, Howard C...
DSOM
2006
Springer
15 years 8 months ago
Detecting Bottleneck in n-Tier IT Applications Through Analysis
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...
MVA
2007
138views Computer Vision» more  MVA 2007»
15 years 5 months ago
Vehicle Tracking Using Image Alignment and Haar Transform
The large number of rear end collisions due to driver inattention has been identified as a major automotive safety issue. In this paper, we describe a 3-phase vehicle tracking met...
Lap-Chi Cheung, Yiu Sang Moon
CGVR
2006
15 years 5 months ago
Extensible Interface Using Projector-Based Augmentation
- This paper describes our design and implementations of projector-based computer augmented environment that allows users to interchange digital information between a computer and ...
Sang Heon Han, Jung Hoon Kim, Tae Soo Yun, Dong Ho...