Sciweavers

7821 search results - page 1453 / 1565
» Nested Ordered Sets and their Use for Data Modelling
Sort
View
ACSAC
2003
IEEE
15 years 6 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
IPPS
2003
IEEE
15 years 6 months ago
Homeostatic and Tendency-Based CPU Load Predictions
The dynamic nature of a resource-sharing environment means that applications must be able to adapt their behavior in response to changes in system status. Predictions of future sy...
Lingyun Yang, Ian T. Foster, Jennifer M. Schopf
113
Voted
ISI
2003
Springer
15 years 5 months ago
Authorship Analysis in Cybercrime Investigation
Criminals have been using the Internet to distribute a wide range of illegal materials globally in an anonymous manner, making criminal identity tracing difficult in the cybercrime...
Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen
106
Voted
SG
2009
Springer
15 years 5 months ago
User-Centered Development of a Visual Exploration System for In-Car Communication
Abstract. Modern premium automobiles are equipped with an increasing number of Electronic Control Units (ECUs). These ECUs are interconnected and form a complex network to provide ...
Michael Sedlmair, Benjamin Kunze, Wolfgang Hinterm...
BTW
2001
Springer
129views Database» more  BTW 2001»
15 years 5 months ago
Schema Evolution in Federated Information Systems
Mediators – used in federated information systems – provide a homogeneous read-only access to a set of autonomous information sources. To achieve semantic integration of the h...
Susanne Busse, Claudia Pons
« Prev « First page 1453 / 1565 Last » Next »