Sciweavers

2335 search results - page 390 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
146
Voted
CCS
2007
ACM
15 years 5 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
MM
2004
ACM
191views Multimedia» more  MM 2004»
15 years 7 months ago
SwarmArt: interactive art from swarm intelligence
This paper describes SwarmArt, a collaborative project between computer science and art, which resulted in two installations of interactive art that incorporates swarm intelligenc...
Jeffrey E. Boyd, Gerald Hushlak, Christian Jacob
P2P
2006
IEEE
229views Communications» more  P2P 2006»
15 years 7 months ago
Cost-Aware Processing of Similarity Queries in Structured Overlays
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
STORAGESS
2005
ACM
15 years 7 months ago
Expecting the unexpected: adaptation for predictive energy conservation
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the dis...
Jeffrey P. Rybczynski, Darrell D. E. Long, Ahmed A...
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 6 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...