Sciweavers

1202 search results - page 197 / 241
» Knowledge as a Service and Knowledge Breaching
Sort
View
113
Voted
CP
2006
Springer
15 years 5 months ago
Interactive Distributed Configuration
Interactive configuration is the concept of assisting a user in selecting values for parameters that respect given constraints. It was originally inspired by the product configurat...
Peter Tiedemann, Tarik Hadzic, Thomas Stuart Henne...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 5 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
DAWAK
2006
Springer
15 years 5 months ago
Integrating Different Grain Levels in a Medical Data Warehouse Federation
Healthcare organizations practicing evidence-based medicine strive to unite their data resources in order to achieve a wider knowledge base for sophisticated research and matured d...
Marko Banek, A. Min Tjoa, Nevena Stolba
ACSAC
2001
IEEE
15 years 5 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
SBIA
2000
Springer
15 years 5 months ago
User profiling with Case-Based Reasoning and Bayesian Networks
Agent technology provides many services to users. The tasks in which agents are involved include information filtering, information retrieval, user's tasks automation, browsin...
Silvia N. Schiaffino, Analía Amandi