Sciweavers

325 search results - page 17 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
160
Voted
DASC
2006
IEEE
15 years 6 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
136
Voted
IPPS
1999
IEEE
15 years 4 months ago
Design and Implementation of a Scalable Parallel System for Multidimensional Analysis and OLAP
Multidimensional Analysis and On-Line Analytical Processing (OLAP) uses summary information that requires aggregate operations along one or more dimensions of numerical data value...
Sanjay Goil, Alok N. Choudhary
106
Voted
TES
2000
Springer
15 years 4 months ago
Web Services and Information Delivery for Diverse Environments
There is a growing need for techniques that provide alternative means to access Web content and services, be it the ability to browse the Web through a voice interface like the Ph...
Juliana Freire, Bharat Kumar
108
Voted
ICPP
2008
IEEE
15 years 7 months ago
Machine Learning Models to Predict Performance of Computer System Design Alternatives
Computer manufacturers spend a huge amount of time, resources, and money in designing new systems and newer configurations, and their ability to reduce costs, charge competitive p...
Berkin Özisikyilmaz, Gokhan Memik, Alok N. Ch...
ITCC
2005
IEEE
15 years 6 months ago
VisDP: A Web Service for Visualizing Design Patterns on Demand
Design patterns document good design solutions to a recurring problem in a particular context. They are typically modeled using UML. In practice, however, pattern-related informat...
Jing Dong, Sheng Yang, Kang Zhang