Sciweavers

6071 search results - page 94 / 1215
» A management information repository for distributed applicat...
Sort
View
IWIA
2006
IEEE
14 years 3 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
VLDB
2007
ACM
160views Database» more  VLDB 2007»
14 years 3 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
IOR
2008
148views more  IOR 2008»
13 years 9 months ago
A Game-Theoretic Approach to Efficient Power Management in Sensor Networks
Wireless sensor networks pose numerous fundamental coordination problems. For instance, in a number of application domains including homeland security, environmental monitoring an...
Enrique Campos-Náñez, Alfredo Garcia...
TODAES
2008
104views more  TODAES 2008»
13 years 8 months ago
Wavelet-based dynamic power management for nonstationary service requests
The goal of dynamic power management is to reduce power dissipation in system level by putting system components into different states. This paper proposes a wavelet based approac...
Ali Abbasian, Safar Hatami, Ali Afzali-Kusha, Mass...
IEEEARES
2010
IEEE
14 years 3 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...