Sciweavers

3544 search results - page 408 / 709
» Information Security in Open Systems
Sort
View
CCS
1999
ACM
15 years 4 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speciļ...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
JCDL
2006
ACM
141views Education» more  JCDL 2006»
15 years 5 months ago
An architecture for the aggregation and analysis of scholarly usage data
Although recording of usage data is common in scholarly information services, its exploitation for the creation of valueadded services remains limited due to concerns regarding, a...
Johan Bollen, Herbert Van de Sompel
COOPIS
2004
IEEE
15 years 3 months ago
Dynamic Access Control for Ubiquitous Environments
Current ubiquitous computing environments provide many kinds of information. This information may be accessed by different users under varying conditions depending on various conte...
Jehan Wickramasuriya, Nalini Venkatasubramanian
GI
2010
Springer
14 years 10 months ago
Finite System Composition and Interaction
: In this article, it is proven for finite systems that if by reciprocal interaction, one finite system determines the action of another finite system, then both systems become sub...
Johannes Reich
IEEECIT
2010
IEEE
14 years 10 months ago
An Innovative Course about Network Storage and System Virtualization Technologies in PKU
ā€”ā€œNetwork Storage and System Virtualization Technologiesā€ is an up-to-date course opened by the school of electronics engineering and computer science of Peking University. T...
Xiaolin Wang, Xinxin Jin, Yingwei Luo, Zhenlin Wan...