It is well known that transactional and analytical systems each require different database architecture. In general, the database structure of transactional systems is optimized f...
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
Systems Managed Storage is a proven concept in traditional mainframe computing. Client-Server operating systems have traditionally lacked the tape I/O subsystem, file system intel...
Abstract. In today’s world, document management plays an increasingly important role. However, there is currently no solution to manage complex documents in an integrated manner....
Christian Tilgner, Dietrich Christopeit, Klaus R. ...
We present a quality management method for multimedia applications. The method takes as input an application software composed of actions. The execution times of actions are unkno...
Jacques Combaz, Jean-Claude Fernandez, Joseph Sifa...