Sciweavers

1488 search results - page 154 / 298
» Botnets for Scalable Management
Sort
View
ISI
2004
Springer
15 years 9 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
KDD
2004
ACM
624views Data Mining» more  KDD 2004»
15 years 9 months ago
Programming the K-means clustering algorithm in SQL
Using SQL has not been considered an efficient and feasible way to implement data mining algorithms. Although this is true for many data mining, machine learning and statistical a...
Carlos Ordonez
AGENTLINK
2003
Springer
283views ECommerce» more  AGENTLINK 2003»
15 years 9 months ago
MIKS : An Agent Framework Supporting Information Access and Integration
Providing an integrated access to multiple heterogeneous sources is a challenging issue in global information systems for cooperation and interoperability. In the past, companies h...
Domenico Beneventano, Sonia Bergamaschi, Gionata G...
MATA
2001
Springer
177views Communications» more  MATA 2001»
15 years 8 months ago
A Self-adaptable Agent System for Efficient Information Gathering
As networks become all-pervasive the importance of efficient information gathering for purposes such as monitoring, fault diagnosis, and performance evaluation can only increase. E...
Antonio Liotta, George Pavlou, Graham Knight
OOPSLA
2001
Springer
15 years 8 months ago
Multitasking without Compromise: A Virtual Machine Evolution
The Multitasking Virtual Machine (called from now on simply MVM) is a modification of the Java™ virtual machine. It enables safe, secure, and scalable multitasking. Safety is ac...
Grzegorz Czajkowski, Laurent Daynès