Sciweavers

1202 search results - page 195 / 241
» Knowledge as a Service and Knowledge Breaching
Sort
View
ACSAC
1998
IEEE
15 years 6 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
KDD
1998
ACM
164views Data Mining» more  KDD 1998»
15 years 6 months ago
A Data Mining Support Environment and its Application on Insurance Data
Huge masses of digital data about products, customers and competitors have become available for companies in the services sector. In order to exploit its inherent (and often hidde...
Martin Staudt, Jörg-Uwe Kietz, Ulrich Reimer
ICMCS
1997
IEEE
117views Multimedia» more  ICMCS 1997»
15 years 6 months ago
Cooperative QoS Management for Multimedia Applications
Quality of Service (QoS) management becomes more and more important, especially in networks where many applications are competing for a limited number of resources. As these appli...
Stefan Fischer, Abdelhakim Hafid, Gregor von Bochm...
ECLIPSE
2007
ACM
15 years 5 months ago
Building, deploying, and monitoring distributed applications with Eclipse and R-OSGI
Designing and testing distributed applications is still a difficult task that requires in-depth knowledge about networking issues. Eclipse is, among other things, a powerful and w...
Jan S. Rellermeyer, Gustavo Alonso, Timothy Roscoe
FUZZIEEE
2007
IEEE
15 years 5 months ago
A System for Querying with Qualitative Distances in Networks
A central role of Geographic Information Systems (GIS) is to allow the identification and visualisation of relevant spatial features from typically large volumes of data. This requ...
Carl P. L. Schultz, Hans W. Guesgen, Robert Amor