Sciweavers

1737 search results - page 178 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
DASFAA
2006
IEEE
133views Database» more  DASFAA 2006»
15 years 11 months ago
Mining Spatio-temporal Association Rules, Sources, Sinks, Stationary Regions and Thoroughfares in Object Mobility Databases
Abstract. As mobile devices proliferate and networks become more locationaware, the corresponding growth in spatio-temporal data will demand analysis techniques to mine patterns th...
Florian Verhein, Sanjay Chawla
139
Voted
GIS
1995
ACM
15 years 8 months ago
Object-Oriented Requirements Engineering for GIS Applications
We stress the importance of requirements engineering (RE) for the development of large scale software in general and for GIS-applications in particular. RE analyses the problem do...
Georg Kösters, Bernd-Uwe Pagel, Hans-Werner S...
145
Voted
OSDI
1994
ACM
15 years 6 months ago
The Design and Evaluation of a Shared Object System for Distributed Memory Machines
This paper describes the design and evaluation of SAM, a shared object system for distributed memory machines. SAM is a portable run-time system that provides a global name space ...
Daniel J. Scales, Monica S. Lam
CCS
2008
ACM
15 years 7 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen
ICIAR
2005
Springer
15 years 10 months ago
Digital Video Scrambling Using Motion Vector and Slice Relocation
As digitalized content rapidly proliferates in networked systems, content security necessarily arises as one of the most important issues. Many developers have studied techniques ...
Sang Gu Kwon, Woong Il Choi, Byeungwoo Jeon