Sciweavers

28445 search results - page 5598 / 5689
» Anatomically based modeling
Sort
View
DBSEC
2006
131views Database» more  DBSEC 2006»
15 years 5 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
IADIS
2004
15 years 5 months ago
A Scalable I/O Architecture and File System for Internet Servers
Most Internet services rely on the traditional client-server model, where the quality of services usually depends on the performance of those servers. In this paper, we propose a ...
Chei-Yol Kim, Sung-Hoon Sohn, Baik-Song Ahn, Gyu-I...
IADIS
2004
15 years 5 months ago
Prototype of Cyber Assistant Professor: CAP
To reduce the production cost of 3D-CG educational contents for e-Learning system and to improve the capability of self-learning system, we developed a new self-learning system ba...
Hiroshi Matsuda, Yoshiaki Shindo
ICETE
2004
253views Business» more  ICETE 2004»
15 years 5 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
BXML
2003
15 years 5 months ago
An Instructional Component for Dynamic Course Generation and Delivery
: E-Learning offers the advantage of interactivity: an E-Learning system can adapt the learning materials to suit the learner’s personality and his goals, and it can react to the...
Carsten Ullrich
« Prev « First page 5598 / 5689 Last » Next »