Sciweavers

334 search results - page 22 / 67
» Adaptive Security Metrics for Computer Systems
Sort
View
138
Voted
IPPS
2000
IEEE
15 years 8 months ago
A Requirements Analysis for Parallel KDD Systems
Abstract. The current generation of data mining tools have limited capacity and performance, since these tools tend to be sequential. This paper explores a migration path out of th...
William Maniatty, Mohammed Javeed Zaki
175
Voted
SDMW
2010
Springer
15 years 1 months ago
Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little ...
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, P...
143
Voted
ACSW
2006
15 years 5 months ago
Simulating a computational grid with networked animat agents
Computational grids are now widespread, but their large-scale behaviour is still poorly understood. We report on some calculations of loading, scaling and utilisation behaviours o...
Kenneth A. Hawick, Heath A. James
151
Voted
SIGGRAPH
1998
ACM
15 years 7 months ago
A Multiscale Model of Adaptation and Spatial Vision for Realistic Image Display
In this paper we develop a computational model of adaptation and spatial vision for realistic tone reproduction. The model is based on a multiscale representation of pattern, lumi...
Sumanta N. Pattanaik, James A. Ferwerda, Mark D. F...
125
Voted
DSN
2005
IEEE
15 years 9 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...