The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the...
To maintain availability and responsiveness, mobile applications sharing data often work on their own copy and transmit local changes to other participants. Existing systems for re...
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
: A lot of research has been developed for integrating the analysis functionality that is available in both analytic and geographic processing systems. The main goal is to provide ...
Information visualisation exploits the natural perceptual capabilities of the decisionfacilitate the rapid assimilation and analysis of abstract, complex and often voluminous info...
Tim Pattison, Rudi Vernik, Daniel Goodburn, Matthe...