Sciweavers

2402 search results - page 453 / 481
» Performance Analysis of a Distributed Question Answering Sys...
Sort
View
NSPW
2004
ACM
15 years 5 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
SC
2004
ACM
15 years 5 months ago
VMPlants: Providing and Managing Virtual Machine Execution Environments for Grid Computing
Virtual machines provide flexible, powerful execution environments for Grid computing, offering isolation and security mechanisms complementary to operating systems, customization...
Ivan Krsul, Arijit Ganguly, Jian Zhang, José...
CLUSTER
2003
IEEE
15 years 5 months ago
Implications of a PIM Architectural Model for MPI
Memory may be the only system component that is more commoditized than a microprocessor. To simultaneously exploit this and address the impending memory wall, processing in memory...
Arun Rodrigues, Richard C. Murphy, Peter M. Kogge,...
RTAS
2003
IEEE
15 years 5 months ago
Real-Time Support for Mobile Robotics
Coordinated behavior of mobile robots is an important emerging application area. Different coordinated behaviors can be achieved by assigning sets of control tasks, or strategies,...
Huan Li, John Sweeney, Krithi Ramamritham, Roderic...
GW
2003
Springer
310views Biometrics» more  GW 2003»
15 years 5 months ago
Ghost in the Cave - An Interactive Collaborative Game Using Non-verbal Communication
The interactive game environment, Ghost in the Cave, presented in this short paper, is a work still in progress. The game involves participants in an activity using non-verbal emot...
Marie-Louise Rinman, Anders Friberg, Bendik Bendik...