Sciweavers

234 search results - page 42 / 47
» Architecture Implementation Using the Machine Description La...
Sort
View
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 7 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
105
Voted
GI
2009
Springer
14 years 7 months ago
Ontology Design for Information Integration in Disaster Management
: One of the most pressing issues in improving disaster management is that of information integration. With many organizations involved in the disaster, crossing regional or even n...
Grigori Babitski, Florian Probst, Jörg Hoffma...
INTERNET
2002
175views more  INTERNET 2002»
14 years 9 months ago
Web Services Interaction Models, Part 1: Current Practice
of abstractions a middleware system makes available to applications, they figure prominently in determining the breadth and variety of application integration that the middleware s...
Steve Vinoski
101
Voted
ESWS
2008
Springer
14 years 11 months ago
Querying Distributed RDF Data Sources with SPARQL
Integrated access to multiple distributed and autonomous RDF data sources is a key challenge for many semantic web applications. As a reaction to this challenge, SPARQL, the W3C Re...
Bastian Quilitz, Ulf Leser
115
Voted
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 5 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson