Sciweavers

877 search results - page 174 / 176
» Intrusion detection systems as evidence
Sort
View
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
13 years 11 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury
MM
2006
ACM
199views Multimedia» more  MM 2006»
13 years 11 months ago
Concept-based electronic health records: opportunities and challenges
Healthcare is a data-rich but information-poor domain. Terabytes of multimedia medical data are being generated on a monthly basis in a typical healthcare organization in order to...
Shahram Ebadollahi, Anni Coden, Michael A. Tanenbl...
IMC
2010
ACM
13 years 3 months ago
Primitives for active internet topology mapping: toward high-frequency characterization
Current large-scale topology mapping systems require multiple days to characterize the Internet due to the large amount of probing traffic they incur. The accuracy of maps from ex...
Robert Beverly, Arthur Berger, Geoffrey G. Xie
GROUP
2005
ACM
13 years 11 months ago
Proactive support for the organization of shared workspaces using activity patterns and content analysis
Shared workspace systems provide virtual places for selforganized and semi-structured cooperation between local and distributed team members. These cooperation systems have been a...
Wolfgang Prinz, Baber Zaman
SIGMETRICS
2003
ACM
115views Hardware» more  SIGMETRICS 2003»
13 years 11 months ago
Measuring the effects of internet path faults on reactive routing
Empirical evidence suggests that reactive routing systems improve resilience to Internet path failures. They detect and route around faulty paths based on measurements of path per...
Nick Feamster, David G. Andersen, Hari Balakrishna...