Sciweavers

551 search results - page 80 / 111
» Preventing existence
Sort
View
VIS
2007
IEEE
149views Visualization» more  VIS 2007»
16 years 1 months ago
Time Dependent Processing in a Parallel Pipeline Architecture
Pipeline architectures provide a versatile and efficient mechanism for constructing visualizations, and they have been implemented in numerous libraries and applications over the p...
John Biddiscombe, Berk Geveci, Ken Martin, Kenn...
ICWS
2009
IEEE
15 years 9 months ago
Service Supervision: Coordinating Web Services in Open Environment
ite Web service designed based on abstract Web services, which define only interfaces, allows an application developer to select services required for his application only by set...
Masahiro Tanaka, Toru Ishida, Yohei Murakami, Sato...
IEEEARES
2009
IEEE
15 years 6 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
CCS
2009
ACM
15 years 6 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
ACSAC
2008
IEEE
15 years 6 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...