Sciweavers

3002 search results - page 527 / 601
» Toward Virtual Humans
Sort
View
VIZSEC
2004
Springer
15 years 8 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
ICAC
2007
IEEE
15 years 7 months ago
Exploiting Platform Heterogeneity for Power Efficient Data Centers
It has recently become clear that power management is of critical importance in modern enterprise computing environments. The traditional drive for higher performance has influenc...
Ripal Nathuji, Canturk Isci, Eugene Gorbatov
138
Voted
CAV
2006
Springer
95views Hardware» more  CAV 2006»
15 years 7 months ago
Yasm: A Software Model-Checker for Verification and Refutation
Example Guided Abstraction Refinement (CEGAR) [6] framework. A number of wellengineered software model-checkers are available, e.g., SLAM [1] and BLAST [12]. Why build another one?...
Arie Gurfinkel, Ou Wei, Marsha Chechik
SIGUCCS
2000
ACM
15 years 7 months ago
On the Road to Becoming a Statewide ISP
This paper discusses the technical and policy issues that West Virginia Network (WVNET) encountered when it expanded its statewide Internet dialup service through an outsourcing p...
Roman Olynyk
134
Voted
IDMS
1997
Springer
188views Multimedia» more  IDMS 1997»
15 years 7 months ago
An Approach for an Adaptive Visualization in a Mobile Environment
With the evolving availability of wireless communication servicesand of affordable mobile devices such as notebooks or Personal Digital Assistants, mobile computing is becoming wid...
Luc Neumann, Alberto Barbosa Raposo