Sciweavers

4747 search results - page 160 / 950
» Application Experience with a Repository System for Informat...
Sort
View
120
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
166
Voted
EUROSYS
2008
ACM
16 years 17 days ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
135
Voted
SAINT
2005
IEEE
15 years 9 months ago
Adaptive Semantic Support Provisioning in Mobile Internet Environments
The Mobile Internet scenario encourages the design and development of context-aware applications that provide results depending on context information, such as the relative positi...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
139
Voted
APWEB
2005
Springer
15 years 9 months ago
An LOD Model for Graph Visualization and Its Application in Web Navigation
This paper presents a new method for visualizing and navigating huge graphs. The main feature of this method is that it applies Level-Of-Detail (LOD) strategy to graph visualizati...
Shixia Liu, Yue Pan, Liping Yang, Wenyin Liu
152
Voted
DSRT
2008
IEEE
15 years 10 months ago
Simulation Driven Experiment Control in Driver Assistance Assessment
Embedded systems technologies and advances in micro electronics have accelerated the evolution of driver assistance systems towards more driving safety, comfort, entertainment and...
Andreas Riener, Alois Ferscha