Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
A system that enables real time query processing on large spatial networks is demonstrated. The system provides functionality for processing a wide range of spatial queries such a...
Increasing use of the Internet for critical services makes flooding distributed denial-of-service (DDoS) a top security threat. A distributed nature of DDoS suggests that a distr...
George C. Oikonomou, Jelena Mirkovic, Peter L. Rei...
Design aspects and software modelling for ubiquitous real-time camera system are described in this paper. We propose system architecture using a network of inexpensive cameras and...
Chang Hong Lin, Wayne Wolf, Andrew Dixon, Xenofon ...
Abstract. UML diagrams have become the de-facto standard for the visual modeling of software systems. The creation and discussion of these diagrams is a critical factor impacting t...