Sciweavers

3898 search results - page 378 / 780
» Maintaining Component-Based Systems
Sort
View
157
Voted
IWMMDBMS
1998
92views more  IWMMDBMS 1998»
15 years 6 months ago
Version Management and Recoverability for Large Object Data
Most applications that access large data objects do so through file systems, but file systems provide an incomplete solution, as they maintain insufficient metadata and do not pro...
Randal C. Burns, Inderpal Narang
GLOBECOM
2008
IEEE
15 years 5 months ago
Security Rules Specification and Analysis Based on Passive Testing
Security is a critical issue in dynamic and open distributed environments such as network-based services or wireless networks. To ensure that a certain level of security is maintai...
Wissam Mallouli, Fayçal Bessayah, Ana R. Ca...
152
Voted
CORR
2010
Springer
149views Education» more  CORR 2010»
15 years 5 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
IPM
2006
100views more  IPM 2006»
15 years 5 months ago
Automatic indexing of online health resources for a French quality controlled gateway
The profusion of online resources calls for tools and methods to help Internet users find precisely what they are looking for. Quality controlled gateway CISMeF provides such serv...
Aurélie Névéol, Alexandrina R...
127
Voted
JCP
2007
126views more  JCP 2007»
15 years 5 months ago
ADE: Utility Driven Self-management in a Networked Environment
ADE, autonomic distributed environment, is a system which engages autonomic elements to automatically take an existing centralized application and distribute it across available re...
Debzani Deb, M. Muztaba Fuad, Michael J. Oudshoorn