Sciweavers

3498 search results - page 616 / 700
» Role Model Based Framework Design and Integration
Sort
View
OTM
2007
Springer
15 years 10 months ago
ImageNotion: Methodology, Tool Support and Evaluation
The content of image archives changes rapidly. This makes the traditional separation of ontology development and image annotation steps no longer feasible. In this paper, we presen...
Andreas Walter, Gábor Nagypál
WETICE
2006
IEEE
15 years 10 months ago
Security Verification Techniques Applied to PatchLink COTS Software
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...
NETWORKING
2000
15 years 5 months ago
A Scheme for Time-Dependent Resource Reservation in QoS-Enabled IP Networks
A number of distributed applications require communication services with Quality of Service (QoS) guarantees. The QoS provisioning issue in the Internet has been addressed by the I...
Roberto Canonico, Simon Pietro Romano, Mauro Selli...
JSW
2008
98views more  JSW 2008»
15 years 4 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
CNSM
2010
15 years 1 months ago
Risk management in VoIP infrastructures using support vector machines
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Ol...