Sciweavers

730 search results - page 144 / 146
» Reflections on network architecture: an active networking pe...
Sort
View
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 3 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
LOCA
2005
Springer
15 years 2 months ago
The COMPASS Location System
The aim of COMPASS (short for COM mon Positioning Architecture for Several Sensors) is to realize a location infrastructure which can make use of a multitude of different sensors,...
Frank Kargl, Alexander Bernauer
AAAI
1997
14 years 10 months ago
Intelligent Agents for the Synthetic Battlefield: A Company of Rotary Wing Aircraft
1 We have constructed a team of intelligent agents that perform the tasks of an attack helicopter company for a synthetic battlefield environment used for running largescale milita...
Randall W. Hill Jr., Johnny Chen, Jonathan Gratch,...
VIS
2006
IEEE
214views Visualization» more  VIS 2006»
15 years 10 months ago
Hub-based Simulation and Graphics Hardware Accelerated Visualization for Nanotechnology Applications
The Network for Computational Nanotechnology (NCN) has developed a science gateway at nanoHUB.org for nanotechnology education and research. Remote users can browse through online...
Wei Qiao, Michael McLennan, Rick Kennell, David...
WWW
2009
ACM
15 years 10 months ago
A trust management framework for service-oriented environments
Many reputation management systems have been developed under the assumption that each entity in the system will use a variant of the same scoring function. Much of the previous wo...
William Conner, Arun Iyengar, Thomas A. Mikalsen, ...