Sciweavers

1456 search results - page 106 / 292
» An Overview of the SODA System
Sort
View
ISMIS
2005
Springer
14 years 3 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
CBSE
2010
Springer
14 years 2 months ago
Comparison of Component Frameworks for Real-Time Embedded Systems
Abstract. The usage of components brings significant help in development of real-time embedded systems. There have been a number of component frameworks developed for this purpose...
Petr Hosek, Tomás Pop, Tomás Bures, ...
ECIS
2001
13 years 11 months ago
Using performance measurement models for benefit realization with enterprise systems the Queensland government approach
A range of influences, technical and organizational, has encouraged the wide spread adaption of Enterprise Systems (ES). Nevertheless, there is a growing consensus that Enterprise...
Darshana Sedera, Michael Rosemann, Guy G. Gable
CORR
2004
Springer
101views Education» more  CORR 2004»
13 years 10 months ago
Parallel Computing Environments and Methods for Power Distribution System Simulation
Abstract -- The development of cost-effective highperformance parallel computing on multi-processor supercomputers makes it attractive to port excessively time consuming simulation...
Ning Lu, Z. Todd Taylor, David P. Chassin, Ross T....
VLDB
2001
ACM
126views Database» more  VLDB 2001»
14 years 10 months ago
Semantic integrity support in SQL: 1999 and commercial (object-)relational database management systems
The correctness of the data managed by database systems is vital to any application that utilizes data for business, research, and decision-making purposes. To guard databases agai...
Can Türker, Michael Gertz