Sciweavers

10066 search results - page 19 / 2014
» A Technique for Information System Integration
Sort
View
ASPLOS
2011
ACM
12 years 11 months ago
Ensuring operating system kernel integrity with OSck
Kernel rootkits that modify operating system state to avoid detection are a dangerous threat to system security. This paper presents OSck, a system that discovers kernel rootkits ...
Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indraj...
JDCTA
2008
535views more  JDCTA 2008»
13 years 7 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
JUCS
2010
134views more  JUCS 2010»
13 years 6 months ago
Leveraging ICT Deployment and Integration in a Public Organization Aged 176 Years A Greek Case Study
: The successful deployment and exploitation of an Information and Communications Technologies (ICT) project in a traditional Public Organization involves the proper design and imp...
Melpomeni Hatzikou, Iraklis-Panagiotis Agiovlasiti...
ICDCS
2002
IEEE
14 years 17 days ago
A Practical Approach for ?Zero? Downtime in an Operational Information System
An Operational Information System (OIS) supports a real-time view of an organization’s information critical to its logistical business operations. A central component of an OIS ...
Ada Gavrilovska, Karsten Schwan, Van Oleson
APWEB
2005
Springer
14 years 1 months ago
PODWIS: A Personalized Tool for Ontology Development in Domain Specific Web Information System
Complex structure and varying requirements increase the difficulties in developing domain specific Web Information Systems. People appeal to a smart tool to customize Web Informati...
Lv-an Tang, Hongyan Li, Zhiyong Pan, Shaohua Tan, ...