Sciweavers

3544 search results - page 638 / 709
» Information Security in Open Systems
Sort
View
CCGRID
2006
IEEE
15 years 5 months ago
An Extensible Resource Discovery Mechanism for Grid Computing Environments
Grid computing is emerging as a new infrastructure to provide collaborative and secure resource sharing over multiple geographically distributed organizations. In this scenario, r...
Tania Gomes Ramos, Alba Cristina Magalhaes Alves d...
ISSRE
2006
IEEE
15 years 5 months ago
Memoized Forward Computation of Dynamic Slices
Forward computation of dynamic slices is necessary to support interactive debugging and online analysis of long running programs. However, the overhead of existing forward computi...
Wes Masri, Nagi Nahas, Andy Podgurski
79
Voted
IDEAL
2005
Springer
15 years 4 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
DSOM
2003
Springer
15 years 4 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
IDA
2010
Springer
15 years 3 months ago
Using CAPTCHAs to Index Cultural Artifacts
: Rock art, human-made markings on stone, is an important cultural and the earliest expression of abstract thinking. While there are tens of millions of photographs of rock art in ...
Qiang Zhu 0002, Eamonn J. Keogh