Sciweavers

1090 search results - page 104 / 218
» A Replicated Monitoring Tool
Sort
View
IFIP
2007
Springer
14 years 4 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
ICALT
2006
IEEE
14 years 4 months ago
Tuning IMS LD for Implementing a Collaborative Lifelong Learning Scenario
This paper describes an approach for modeling and implementing a collaborative learning situation, which is part of a real lifelong learning scenario in astronomy. We adopt and sl...
Davinia Hernández Leo, Eloy D. Villasclaras...
ICAC
2005
IEEE
14 years 3 months ago
The J3 Process for Building Autonomic Enterprise Java Bean Systems
Autonomic computer systems aim to reduce the configuration, operational, and maintenance costs of distributed enterprise applications. This paper provides two contributions to the...
Jules White, Douglas C. Schmidt, Aniruddha S. Gokh...
QSIC
2005
IEEE
14 years 3 months ago
Interactive Visualisation and Testing of Jini Services
Dynamic service-oriented architectures aim to provide more flexible and robust systems that are able to handle change over time. Their dynamic nature however, provides extra chall...
Bruce Quig, Michael Kölling, John Rosenberg, ...
ECOOPW
1999
Springer
14 years 2 months ago
Aspects and Superimpositions
The model checking of applications of aspects is explained, by showing the stages and proof obligations when a collection of generic aspects (called a superimposition) is combined...
Shmuel Katz, Joseph Gil