Sciweavers

341 search results - page 63 / 69
» A Security Engineering Process based on Patterns
Sort
View
DMIN
2006
141views Data Mining» more  DMIN 2006»
15 years 1 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
ECIS
2003
15 years 1 months ago
The ERP system as a part of an organization's administrative paradox
This paper argues that ERP systems take the part of an organization’s administrative paradox. An administrative paradox is two sides of the same coin when coordinating organizat...
Ulf Melin
80
Voted
IJCAI
1989
15 years 23 days ago
Approximation of Indistinct Concepts
This theory on semi-equivalence r e l a t i o n s is an important and useful tool for i n v e s t i g a t i n g c l a s s i f i c a t i o n , pattern r e c o g n i t i o n , p o l...
Zhang Mingyi
FOSSACS
2004
Springer
15 years 5 months ago
safeDpi: A Language for Controlling Mobile Code
safeDpi is a distributed version of the Picalculus, in which processes are located at dynamically created sites. Parametrised code may be sent between sites using so-called ports, ...
Matthew Hennessy, Julian Rathke, Nobuko Yoshida
EWSA
2005
Springer
15 years 5 months ago
Architecture Description for Mobile Distributed Systems
Abstract. In this paper we motivate an Architecture Description Language (ADL) for mobile distributed systems based on the π-calculus. Different from other approaches, the non-fu...
Volker Gruhn, Clemens Schäfer