Sciweavers

2539 search results - page 440 / 508
» Updates for Structure Indexes
Sort
View
NSPW
2004
ACM
15 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
SAC
2004
ACM
15 years 3 months ago
A relational approach to software metrics
There is still no standardization of software measures and metrics extraction tools have to be updated frequently to handle the changes. A possible solution is represented by usin...
Marco Scotto, Alberto Sillitti, Giancarlo Succi, T...
SWS
2004
ACM
15 years 3 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
CINQ
2004
Springer
163views Database» more  CINQ 2004»
15 years 3 months ago
Frequent Itemset Discovery with SQL Using Universal Quantification
Algorithms for finding frequent itemsets fall into two broad classes: (1) algorithms that are based on non-trivial SQL statements to query and update a database, and (2) algorithms...
Ralf Rantzau
EGPGV
2004
Springer
175views Visualization» more  EGPGV 2004»
15 years 3 months ago
Interactive Parallel Visualization of Large Particle Datasets
This paper presents a new interactive parallel method for direct visualization of large particle datasets. Based on a parallel rendering cluster, a frame rate of 9 frames-per-seco...
Kevin Liang, Patricia Monger, Huge Couchman