Sciweavers

1424 search results - page 199 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
15 years 8 months ago
Instance Data Evaluation for Semantic Web-Based Knowledge Management Systems
As semantic web technologies are increasingly used to empower knowledge management systems (KMSs), there is a growing need for mechanisms and automated tools for checking content ...
Jiao Tao, Li Ding, Deborah L. McGuinness
DAC
1999
ACM
16 years 2 months ago
ICEBERG: An Embedded In-Circuit Emulator Synthesizer for Microcontrollers
This paper presents a synthesis tool ICEBERG for embedded in-circuit emulators (ICE's), that are part of the development environment for microcontroller (or microprocessor)-b...
Ing-Jer Huang, Tai-An Lu
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
15 years 1 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
ECTEL
2007
Springer
15 years 5 months ago
A Qualitative and Quantitative Evaluation of Adaptive Authoring of Adaptive Hypermedia
Currently, large amounts of research exist into the design and implementation of adaptive systems. The complex task of authoring of such systems, or their evaluation, is addressed ...
Maurice Hendrix, Alexandra I. Cristea
DAWAK
2008
Springer
15 years 3 months ago
UML-Based Modeling for What-If Analysis
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need by ...
Matteo Golfarelli, Stefano Rizzi