Sciweavers

5386 search results - page 1057 / 1078
» Approaches to Multimedia and Security
Sort
View
EEE
2005
IEEE
15 years 3 months ago
On Comprehensive Contractual Descriptions of Web Services
Comprehensive contractual description of Web Services and Web Service compositions is needed for selection of appropriate Web Services and their service and quality of service (Qo...
Vladimir Tosic, Bernard Pagurek
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
15 years 3 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
KBSE
2005
IEEE
15 years 3 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso
IMC
2005
ACM
15 years 3 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
WOSP
2005
ACM
15 years 3 months ago
From UML to LQN by XML algebra-based model transformations
The change of focus from code to models promoted by OMG's Model Driven Development raises the need for verification of nonfunctional characteristics of UML models, such as pe...
Gordon Ping Gu, Dorina C. Petriu
« Prev « First page 1057 / 1078 Last » Next »