Sciweavers

1860 search results - page 281 / 372
» tools 2009
Sort
View
SAC
2009
ACM
15 years 5 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
SAC
2009
ACM
15 years 5 months ago
Using a product line for creating component systems
Component systems have become a wide-spread technology and found their place in several application domains. Each component system has its specifics and particularities that re...
Tomás Bures, Petr Hnetynka, Michal Malohlav...
96
Voted
SIGCSE
2009
ACM
161views Education» more  SIGCSE 2009»
15 years 5 months ago
An activity-based sensor networks course for undergraduates with sun spot devices
Wireless sensor networks are revolutionizing the instrumentation of the physical world, across scientific, industrial and military applications. In this paper, we describe our eff...
Damon Tyman, Nirupama Bulusu, Jens Mache
SIGSOFT
2009
ACM
15 years 5 months ago
Qos-driven runtime adaptation of service oriented architectures
Runtime adaptation is recognized as a viable way for a serviceoriented system to meet QoS requirements in its volatile operating environment. In this paper we propose a methodolog...
Valeria Cardellini, Emiliano Casalicchio, Vincenzo...
103
Voted
TEI
2009
ACM
92views Hardware» more  TEI 2009»
15 years 5 months ago
Media Crate: tangible live media production interface
Live media production – the presentation of audio-visual content at events such as conferences and concerts – is a high intensity task where a small production team must inter...
Tom Bartindale, Jonathan Hook, Patrick Olivier