Sciweavers

294 search results - page 54 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
VIZSEC
2005
Springer
15 years 3 months ago
A Visualization Methodology for Characterization of Network Scans
Many methods have been developed for monitoring network traffic, both using visualization and statistics. Most of these methods focus on the detection of suspicious or malicious ...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
CCGRID
2003
IEEE
15 years 2 months ago
Programming for Dependability in a Service-based Grid
Service-based Grid infrastructures emphasize service composition rather than sharing of low level resources. The idea is to build Grid applications out of computational services p...
Win Bausch, Cesare Pautasso, Gustavo Alonso
DSOM
2003
Springer
15 years 2 months ago
Policy-Based Autonomic Storage Allocation
The goal of autonomic storage allocation is to achieve allocation of storage resources, their performance monitoring, and hotspot elimination by specifying comparatively high-leve...
Murthy V. Devarakonda, David M. Chess, Ian Whalley...
EPIA
2003
Springer
15 years 2 months ago
Adaptation to Drifting Concepts
Most of supervised learning algorithms assume the stability of the target concept over time. Nevertheless in many real-user modeling systems, where the data is collected over an ex...
Gladys Castillo, João Gama, Pedro Medas
HICSS
2002
IEEE
111views Biometrics» more  HICSS 2002»
15 years 2 months ago
Intelligent Workflow Techniques for Distributed Group Facilitation
Distributed group facilitation techniques are becoming a necessity because many of the face-toface facilitation techniques are no longer suitable in a distributed environment. Alt...
Jay F. Nunamaker, J. Leon Zhao, Robert O. Briggs