Sciweavers

3031 search results - page 525 / 607
» SNMS - Shadow Network Management System
Sort
View
IAW
2003
IEEE
15 years 5 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
IUI
2003
ACM
15 years 5 months ago
Towards individual service provisioning
With the emergence of modularized componentbased electronic services, such as Web Services and semantically tagged services, Individual Service Provisioning, wherein any user can ...
Fredrik Espinoza
DFG
2003
Springer
15 years 5 months ago
Inheritance of Business Processes: A Journey Visiting Four Notorious Problems
Abstract. The new millennium is characterized by speed and distribution in every aspect of most business and organization undertaking. Organizations are challenged to bring ideas a...
Wil M. P. van der Aalst
ACSAC
2002
IEEE
15 years 4 months ago
Enforcing Resource Bound Safety for Mobile SNMP Agents
The integration of mobile agents with SNMP creates significant advantages for the management of complex networks. Nevertheless, the security concerns of mobile agent technology l...
Weijiang Yu, Aloysius K. Mok
DATE
2002
IEEE
94views Hardware» more  DATE 2002»
15 years 4 months ago
E-Design Based on the Reuse Paradigm
This paper gives an overview on a Virtual electronic component or IP (Intellectual Property) exchange infrastructure whose main components are a XML "well structured IP e-cat...
L. Ghanmi, A. Ghrab, M. Hamdoun, B. Missaoui, K. S...