Sciweavers

630 search results - page 89 / 126
» Introducing collaboration into an application development en...
Sort
View
EUROSPI
2005
Springer
15 years 5 months ago
Safety Methods in Software Process Improvement
Even if the application developers produce software in accordance with the customer requirements, they cannot guarantee that the software will behave in a safe way during the lifet...
Torgrim Lauritsen, Tor Stålhane
ISI
2004
Springer
15 years 5 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
APNOMS
2006
Springer
15 years 3 months ago
Information-Driven Task Routing for Network Management in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of a large collection of small nodes providing collaborative and distributed sensing ability in unpredictable environments. Given their unat...
Yu Liu, Yumei Wang, Lin Zhang, Chan-Hyun Youn
IJVR
2006
178views more  IJVR 2006»
14 years 11 months ago
Scene Synchronization in Close Coupled World Representations Using SCIVE
This paper introduces SCIVE, a Simulation Core for Intelligent Virtual Environments. SCIVE provides a Knowledge Representation Layer (KRL) as a central organizing struc...
Marc Erich Latoschik, Christian Fröhlich, Ale...
ACSAC
2001
IEEE
15 years 3 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li