Sciweavers

329 search results - page 31 / 66
» The Dangers of Replication and a Solution
Sort
View
114
Voted
IE
2007
15 years 3 months ago
An evaluation framework for videogame based tasking of remote vehicles
Unmanned vehicles (UV’s) are increasingly being employed in civil and military domains often for operations in dangerous environments. Typically these vehicles require some leve...
Adam J. Hassell, Philip Smith, David Stratton
IFIP3
2004
99views Education» more  IFIP3 2004»
15 years 3 months ago
Government sponsored open source software for school education
: The history of computing can be seen in terms of cultural change engendered by philosophical opposition. In education some key philosophical dichotomies are those of commercial-c...
Andrew E. Fluck
IEEECIT
2010
IEEE
15 years 5 days ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
ASPLOS
2011
ACM
14 years 5 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
WETICE
2009
IEEE
15 years 8 months ago
UniWiki: A Collaborative P2P System for Distributed Wiki Applications
The ever growing request for digital information raises the need for content distribution architectures providing high storage capacity, data availability and good performance. Wh...
Gérald Oster, Pascal Molli, Sergiu Dumitriu...