Sciweavers

4093 search results - page 778 / 819
» Citizen Information Services using Internet Technologies
Sort
View
BWCCA
2010
14 years 6 months ago
Fast Deployment of Computer Forensics with USBs
As popularity of the Internet continues to grow, it changes the way of computer crime. Number of computer crime increases dramatically in recent years and investigators have been f...
Chung-Huang Yang, Pei-Hua Yen
MMMACNS
2005
Springer
15 years 5 months ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
MSS
2007
IEEE
105views Hardware» more  MSS 2007»
15 years 6 months ago
Quota enforcement for high-performance distributed storage systems
Storage systems manage quotas to ensure that no one user can use more than their share of storage, and that each user gets the storage they need. This is difficult for large, dis...
Kristal T. Pollack, Darrell D. E. Long, Richard A....
AWIC
2003
Springer
15 years 5 months ago
Secure Intelligent Agents Based on Formal Description Techniques
This paper describes a practical solution for the incorporation of security services in agents. From a set of basic user requirements, the agents will be able to find out the best ...
L. Mengual, C. de la Puente
IICS
2009
Springer
15 years 4 months ago
Bi-directional Distribution of eLearning Content for Cross-technology Learning Communities
: This article describes the use of a service-oriented architecture to bridge the gap between different eLearning types and tools. The basic concept is a bi-directional distributio...
Raphael Zender, Enrico Dressler, Ulrike Lucke, Dja...