Sciweavers

4044 search results - page 725 / 809
» The Evolution of a Distributed Operating System
Sort
View
122
Voted
ACSAC
2005
IEEE
15 years 8 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson
CCGRID
2005
IEEE
15 years 8 months ago
Empirical evaluation of shared parallel execution on independently scheduled clusters
Parallel machines are typically space shared, or time shared such that only one application executes on a group of nodes at any given time. It is generally assumed that executing ...
M. Ghanesh, S. Kumar, Jaspal Subhlok
99
Voted
EDOC
2005
IEEE
15 years 8 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
135
Voted
ICRA
2005
IEEE
120views Robotics» more  ICRA 2005»
15 years 8 months ago
A Method for Modeling and Control Complex Tendon Transmissions in Haptic Interfaces
— One of the principal guidelines in the design of haptic devices is to provide a suitable mechanical design that can improve control performance and the force-feedback fidelity...
Simone Marcheschi, Antonio Frisoli, Carlo Alberto ...
120
Voted
QSHINE
2005
IEEE
15 years 8 months ago
A Per-Class QoS Service Model in IEEE 802.11e WLANs
Abstract -- In this paper, we study the provision of perclass QoS for IEEE 802.11e Enhanced Distributed Channel Access (EDCA) WLANs. We propose two mechanisms, called BIWF-SP and I...
Jeng Farn Lee, Wanjiun Liao, Meng Chang Chen