Sciweavers

3420 search results - page 631 / 684
» A Language-Based Approach to Security
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 8 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
COMPUTER
1999
108views more  COMPUTER 1999»
13 years 8 months ago
Distance Visualization: Data Exploration on the Grid
Scientific visualization has emerged as an important tool for extracting meaning from the large volumes of data produced by scientific instruments and simulations. Increasingly, t...
Ian T. Foster, Joseph A. Insley, Gregor von Laszew...
CORR
2008
Springer
84views Education» more  CORR 2008»
13 years 8 months ago
Coupling Component Systems towards Systems of Systems
Systems of systems (SoS) are a hot topic in our "fully connected global world". Our aim is not to provide another definition of what SoS are, but rather to focus on the a...
Frédéric Autran, Jean-Philippe Auzel...
NGC
2007
Springer
120views Communications» more  NGC 2007»
13 years 8 months ago
End-to-End QoS Support for a Medical Grid Service Infrastructure
Quality of Service support is an important prerequisite for the adoption of Grid technologies for medical applications. The GEMSS Grid infrastructure addressed this issue by offer...
Siegfried Benkner, Gerhard Engelbrecht, Stuart E. ...
FS
2010
105views more  FS 2010»
13 years 7 months ago
Local time and the pricing of time-dependent barrier options
Abstract A time-dependent double-barrier option is a derivative security that delivers the terminal value φ(ST ) at expiry T if neither of the continuous time-dependent barriers b...
Aleksandar Mijatovic