Sciweavers

3451 search results - page 573 / 691
» Security of Backup Data
Sort
View
HT
2005
ACM
15 years 10 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
168
Voted
PASTE
2005
ACM
15 years 10 months ago
MonDe: safe updating through monitored deployment of new component versions
Safely updating software at remote sites is a cautious balance of enabling new functionality and avoiding adverse effects on existing functionality. A useful first step in this p...
Jonathan E. Cook, Alessandro Orso
126
Voted
SC
2005
ACM
15 years 10 months ago
The Globus Striped GridFTP Framework and Server
The GridFTP extensions to the File Transfer Protocol define a general-purpose mechanism for secure, reliable, high-performance data movement. We report here on the Globus striped ...
William E. Allcock, John Bresnahan, Rajkumar Ketti...
121
Voted
MDAI
2005
Springer
15 years 10 months ago
Noise-Robust Watermarking for Numerical Datasets
Watermarking has been used on multimedia for a variety of applications, among which intellectual property protection stands out. However, and in spite of a growing need, very few a...
Francesc Sebé, Josep Domingo-Ferrer, Agusti...
OOPSLA
2005
Springer
15 years 10 months ago
Fine-grained interoperability through mirrors and contracts
As a value flows across the boundary between interoperating languages, it must be checked and converted to fit the types and representations of the target language. For simple f...
Kathryn E. Gray, Robert Bruce Findler, Matthew Fla...