Sciweavers

10820 search results - page 1878 / 2164
» Understanding
Sort
View
VIZSEC
2004
Springer
15 years 10 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
VLDB
2004
ACM
128views Database» more  VLDB 2004»
15 years 10 months ago
An Annotation Management System for Relational Databases
We present an annotation management system for relational databases. In this system, every piece of data in a relation is assumed to have zero or more annotations associated with ...
Deepavali Bhagwat, Laura Chiticariu, Wang Chiew Ta...
CISIS
2010
IEEE
15 years 10 months ago
Resilient Critical Infrastructure Management Using Service Oriented Architecture
—The SERSCIS project aims to support the use of interconnected systems of services in Critical Infrastructure (CI) applications. The problem of system interconnectedness is aptly...
Martin Hall-May, Mike Surridge
142
Voted
CHI
2010
ACM
15 years 10 months ago
Exploring iterative and parallel human computation processes
Services like Amazon’s Mechanical Turk have opened the door for exploration of processes that outsource computation to humans. These human computation processes hold tremendous ...
Greg Little
149
Voted
AGILEDC
2003
IEEE
15 years 10 months ago
It's More than Just Toys and Food: Leading Agile Development in an Enterprise-Class Start-Up
One of the myths of Agile Development is that selforganizing teams do not need direction. The agile development movement focuses primarily on programmers – programmers should do...
Joseph A. Blotner
« Prev « First page 1878 / 2164 Last » Next »