Vise for Polished Pipe
نویسندگان
چکیده
منابع مشابه
ViSe: The Virtual Security Testbed
Traditional means of testing Intrusion Detection Systems (IDSs) require the creation of isolated physical test networks (testbeds) using machines that must be individually configured for each test. This process becomes cumbersome and resource-intensive when malicious attacks, launched against the pre-configured systems, cause significant harm and require the reinstallation of software before te...
متن کاملViSE - A Virtual Smart Environment for Usability Evaluation
Within the research field of HCI task models are widely used for model-based development of interactive systems. Recently introduced approaches applied task models further to model cooperative behaviour of people interacting in smart environments. However there is a lack of usability methods to support the needs of evaluations during a model-based development process for smart environments. Par...
متن کاملGlobal opportunities in Pipe in Pipe technology
An extensive product range is mandatory to be a key player in the pipe insulation market. The polyurethane preinsulated pipe producers are responding to global opportunities by diversifying their activities into industrial, marine, oil and gas applications. Moreover, the requirements for traditional district heating preinsulated pipes including initial thermal conductivity and its ageing perfor...
متن کاملEstimation of Setup Time for Machined Parts: Accounting for Work-holding Constraints Using a Vise
For machined parts, setup time is a major component of the total time required to manufacture a machined part from a stock. If the number of setups and hence setup time can be reduced, this will not only decrease the manufacturing time, but will also ensure better machining accuracy, require fewer work-holding devices and increase machine usage time. To achieve any improvement in setup time, rs...
متن کاملDigital Forensic Reconstruction and the Virtual Security Testbed ViSe
This paper presents ViSe, a virtual security testbed, and demonstrates how it can be used to efficiently study computer attacks and suspect tools as part of a computer crime reconstruction. Based on a hypothesis of the security incident in question, ViSe is configured with the appropriate operating systems, services, and exploits. Attacks are formulated as event chains and replayed on the testb...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific American
سال: 1909
ISSN: 0036-8733
DOI: 10.1038/scientificamerican09181909-199b