Sciweavers

20024 search results - page 3689 / 4005
» Database Management Systems
Sort
View
122
Voted
PDCAT
2004
Springer
15 years 9 months ago
A High-Level Policy Description Language for the Network ACL
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...
VIZSEC
2004
Springer
15 years 9 months ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
134
Voted
WWIC
2004
Springer
133views Communications» more  WWIC 2004»
15 years 9 months ago
Design of Energy Efficient Wireless Networks Using Dynamic Data Type Refinement Methodology
Abstract. This paper presents a new perspective to the design of wireless networks using the proposed dynamic data type refinement methodology. In the forthcoming years, new portab...
Stylianos Mamagkakis, Alexandros Mpartzas, Georgio...
HICSS
2010
IEEE
156views Biometrics» more  HICSS 2010»
15 years 9 months ago
Tacit Knowledge Flows and Institutional Theory: Accelerating Acculturation
Knowledge is key to sustainable competitive advantage, but different kinds of knowledge affect competitive advantage differently. This applies especially to the environment of inc...
Alicemary Aspell Adams, June G. Chin Yi Lee, Mark ...
136
Voted
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
15 years 9 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
« Prev « First page 3689 / 4005 Last » Next »