Sciweavers

165 search results - page 31 / 33
» Visualization and analysis of phased behavior in Java progra...
Sort
View
VIZSEC
2007
Springer
15 years 3 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
VEE
2006
ACM
178views Virtualization» more  VEE 2006»
15 years 3 months ago
Impact of virtual execution environments on processor energy consumption and hardware adaptation
During recent years, microprocessor energy consumption has been surging and efforts to reduce power and energy have received a lot of attention. At the same time, virtual executio...
Shiwen Hu, Lizy Kurian John
BMCBI
2006
120views more  BMCBI 2006»
14 years 9 months ago
The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy
Background: In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. ...
Arnim Jenett, Johannes E. Schindelin, Martin Heise...
CG
2005
Springer
14 years 9 months ago
Interpretive OpenGL for computer graphics
OpenGL is the industry-leading, cross-platform graphics application programming interface (API), and the only major API with support for virtually all operating systems. Many lang...
Bo Chen, Harry H. Cheng
LCTRTS
2000
Springer
15 years 1 months ago
Approximation of Worst-Case Execution Time for Preemptive Multitasking Systems
The control system of many complex mechatronic products requires for each task the Worst Case Execution Time (WCET), which is needed for the scheduler's admission tests and su...
Matteo Corti, Roberto Brega, Thomas R. Gross