Sciweavers

4044 search results - page 725 / 809
» The Evolution of a Distributed Operating System
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Exploiting Independent State For Network Intrusion Detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessibl...
Robin Sommer, Vern Paxson
CCGRID
2005
IEEE
15 years 3 months ago
Empirical evaluation of shared parallel execution on independently scheduled clusters
Parallel machines are typically space shared, or time shared such that only one application executes on a group of nodes at any given time. It is generally assumed that executing ...
M. Ghanesh, S. Kumar, Jaspal Subhlok
EDOC
2005
IEEE
15 years 3 months ago
Assessment of Enterprise Information Security - The Importance of Prioritization
Assessing the level of information security in an enterprise is a serious challenge for many organizations. This paper considers the prioritization of the field of enterprise info...
Erik Johansson, Pontus Johnson
ICRA
2005
IEEE
120views Robotics» more  ICRA 2005»
15 years 3 months ago
A Method for Modeling and Control Complex Tendon Transmissions in Haptic Interfaces
— One of the principal guidelines in the design of haptic devices is to provide a suitable mechanical design that can improve control performance and the force-feedback fidelity...
Simone Marcheschi, Antonio Frisoli, Carlo Alberto ...
QSHINE
2005
IEEE
15 years 3 months ago
A Per-Class QoS Service Model in IEEE 802.11e WLANs
Abstract -- In this paper, we study the provision of perclass QoS for IEEE 802.11e Enhanced Distributed Channel Access (EDCA) WLANs. We propose two mechanisms, called BIWF-SP and I...
Jeng Farn Lee, Wanjiun Liao, Meng Chang Chen