Sciweavers

3751 search results - page 681 / 751
» Events in security protocols
Sort
View
RAID
1999
Springer
15 years 2 months ago
IDS Standards: Lessons Learned to Date
: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
Stuart Staniford-Chen
ISMVL
1997
IEEE
99views Hardware» more  ISMVL 1997»
15 years 2 months ago
Useful Application of CMOS Ternary Logic to the Realisation of Asynchronous Circuits
This paper shows how the application of a CMOS ternary logic is useful in the realisation of Delay Insensitive (01)asynchronous circuits. It is shown that fully DIasynchronous cir...
Riccardo Mariani, Roberto Roncella, Roberto Salett...
LBM
2007
14 years 11 months ago
Decentralised Clinical Guidelines Modelling with Lightweight Coordination Calculus
Background: Clinical protocols and guidelines have been considered as a major means to ensure that cost-effective services are provided at the point of care. Recently, the comput...
Bo Hu, Srinandan Dasmahapatra, David Robertson, Pa...
IIWAS
2003
14 years 11 months ago
Zero-Latency Data Warehousing for Heterogeneous Data Sources and Continuous Data Streams
In this paper, a framework for building an overall Zero-Latency Data Warehouse system (ZLDWH) is provided. Such a ZLDWH requires tasks such as data changes detection, continuous l...
Tho Manh Nguyen, A. Min Tjoa
TSMC
2008
113views more  TSMC 2008»
14 years 9 months ago
Distributed Diagnosis Under Bounded-Delay Communication of Immediately Forwarded Local Observations
In this paper, we study distributed failure diagnosis under k-bounded communication delay, where each local site transmits its observations to other sites immediately after each o...
Wenbin Qiu, Ratnesh Kumar