Sciweavers

2195 search results - page 384 / 439
» Prototyping Networked Embedded Systems
Sort
View
POLICY
2004
Springer
15 years 8 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
RAID
2004
Springer
15 years 8 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
HICSS
2003
IEEE
193views Biometrics» more  HICSS 2003»
15 years 8 months ago
Message Sense Maker: Engineering a Tool Set for Customer Relationship Management
To determine the important trends and issues in thousands of comments from customers and make strategic decisions about business operations, managers must go over these messages m...
Dmitri Roussinov, J. Leon Zhao
GROUP
2003
ACM
15 years 8 months ago
Supporting activity-centric collaboration through peer-to-peer shared objects
We describe a new collaborative technology that is mid-way between the informality of email and the formality of shared workspaces. Email and other ad hoc collaboration systems ar...
Werner Geyer, Jürgen Vogel, Li-Te Cheng, Mich...
HICSS
2002
IEEE
128views Biometrics» more  HICSS 2002»
15 years 8 months ago
Flexible Instructional Strategies for E-learning
This paper provides an overview on a German lighthouse research project called L3 in the area of e-learning systems that supply e-learning services via a virtual private network. ...
Michael Altenhofen, Joachim Schaper