Sciweavers

774 search results - page 127 / 155
» AIMS: An Immersidata Management System
Sort
View
EUROSYS
2008
ACM
15 years 9 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
GIS
2005
ACM
16 years 25 days ago
Improving the R*-tree with outlier handling techniques
The R*-tree, as a state-of-the-art spatial index, has already found its way into commercial systems like Oracle. In this paper, we aim at improving query performance of the R*tree...
Tian Xia, Donghui Zhang
WWW
2008
ACM
16 years 15 days ago
Using CEP technology to adapt messages exchanged by web services
Web service may be unable to interact with each other because of incompatibilities between their interfaces. In this paper, we present an event driven approach which aims at adapt...
Yehia Taher, Marie-Christine Fauvet, Marlon Dumas,...
WWW
2005
ACM
16 years 14 days ago
Popular web hot spots identification and visualization
This work aims a two-fold contribution: it presents a software to analyse logfiles and visualize popular web hot spots and, additionally, presents an algorithm to use this informa...
D. Avramouli, John D. Garofalakis, Dimitris J. Kav...
IV
2009
IEEE
222views Visualization» more  IV 2009»
15 years 6 months ago
User-Friendly Ontology Editing and Visualization Tools: The OWLeasyViz Approach
This paper aims to propose solutions to the issue of ontology visualization, by presenting intuitive and userfriendly ontology editing and visualization environments mainly orient...
Nadia Catenazzi, Lorenzo Sommaruga, Riccardo Mazza