Sciweavers

5898 search results - page 482 / 1180
» Parallel Computing Environments and Methods
Sort
View
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
15 years 9 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras
159
Voted
ICCHP
1994
Springer
15 years 9 months ago
Synthesizing Non-Speech Sound to Support Blind and Visually Impaired Computer Users
This paper describes work in progress on automatic generation of "impact sounds" based on physical modelling. These sounds can be used as non-speech audio presentation of...
Alireza Darvishi, Valentin Guggiana, Eugen Muntean...
COMSWARE
2007
IEEE
15 years 11 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
ICWS
2007
IEEE
15 years 6 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
159
Voted
FGCS
2007
92views more  FGCS 2007»
15 years 5 months ago
Optimizing Web Service messaging performance in mobile computing
— The performance and efficiency of Web Services can be greatly increased in conversational and streaming message exchanges by streaming the message exchange paradigm. In this pa...
Sangyoon Oh, Geoffrey Fox