Sciweavers

986 search results - page 166 / 198
» Efficient Processing of the Cube Operator
Sort
View
ACSAC
1998
IEEE
15 years 2 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
ICRE
1998
IEEE
15 years 2 months ago
Surfacing Root Requirements Interactions from Inquiry Cycle Requirements Documents
Systems requirements errors are numerous, persistent, and expensive. To detect such errors, and focus on critical ones during the development of a requirements document, we have d...
William N. Robinson, Suzanne D. Pawlowski
PODS
1997
ACM
72views Database» more  PODS 1997»
15 years 2 months ago
OLAP and Statistical Databases: Similarities and Differences
During the 1980's there was a lot of activity in the area of Statistical Databases, focusing mostly on socio-economic type applications, such as census data, national product...
Arie Shoshani
ACSAC
2004
IEEE
15 years 1 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
BROADNETS
2004
IEEE
15 years 1 months ago
Structures for In-Network Moving Object Tracking in Wireless Sensor Networks
One important application of wireless sensor networks is tracking moving objects. The recent progress has made it possible for tiny sensors to have more computing power and storag...
Chih-Yu Lin, Yu-Chee Tseng