Sciweavers

4396 search results - page 812 / 880
» Measuring the Architecture Design Process
Sort
View
ACSAC
2008
IEEE
15 years 11 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
FC
2004
Springer
89views Cryptology» more  FC 2004»
15 years 10 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost eļ¬...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
VIS
2005
IEEE
146views Visualization» more  VIS 2005»
16 years 6 months ago
View Selection for Volume Rendering
In a visualization of a three-dimensional dataset, the insights gained are dependent on what is occluded and what is not. Suggestion of interesting viewpoints can improve both the...
Udeepta Bordoloi, Han-Wei Shen
127
Voted
WWW
2004
ACM
16 years 5 months ago
ResEval: a web-based evaluation system for internal medicine house staff
The evaluation and assessment of physicians-in-training (house staff) is a complex task. Residency training programs are under increasing pressure [1] to provide accurate and comp...
Henry J. Feldman, Marc M. Triola
EUROSYS
2008
ACM
16 years 2 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti