Sciweavers

7811 search results - page 1324 / 1563
» computing 2004
Sort
View
ACSAC
2004
IEEE
15 years 7 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
136
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Securing Java RMI-Based Distributed Applications
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with a service through a proxy, which is code downloaded from a directory and insta...
Ninghui Li, John C. Mitchell, Derrick Tong
144
Voted
ACSD
2004
IEEE
124views Hardware» more  ACSD 2004»
15 years 7 months ago
A Behavioral Type Inference System for Compositional System-on-Chip Design
The design productivity gap has been recognized by the semiconductor industry as one of the major threats to the continued growth of system-on-chips and embedded systems. Ad-hoc s...
Jean-Pierre Talpin, David Berner, Sandeep K. Shukl...
132
Voted
ADC
2004
Springer
109views Database» more  ADC 2004»
15 years 7 months ago
A Model of Dynamic Resource Allocation in Workflow Systems
Current collaborative work environments are characterized by dynamically changing organizational structures. Although there have been several efforts to refine work distribution, ...
Guido Governatori, Antonino Rotolo, Shazia Wasim S...
115
Voted
APGV
2004
ACM
141views Visualization» more  APGV 2004»
15 years 7 months ago
The effects of head-mounted display mechanics on distance judgments in virtual environments
In virtual environments that use head-mounted displays (HMD), distance judgments to targets on the ground are compressed, at least when indicated through visually-directed walking...
Peter Willemsen, Mark B. Colton, Sarah H. Creem-Re...
« Prev « First page 1324 / 1563 Last » Next »