Sciweavers

4747 search results - page 160 / 950
» Application Experience with a Repository System for Informat...
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
EUROSYS
2008
ACM
14 years 5 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
SAINT
2005
IEEE
14 years 1 months ago
Adaptive Semantic Support Provisioning in Mobile Internet Environments
The Mobile Internet scenario encourages the design and development of context-aware applications that provide results depending on context information, such as the relative positi...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
APWEB
2005
Springer
14 years 1 months ago
An LOD Model for Graph Visualization and Its Application in Web Navigation
This paper presents a new method for visualizing and navigating huge graphs. The main feature of this method is that it applies Level-Of-Detail (LOD) strategy to graph visualizati...
Shixia Liu, Yue Pan, Liping Yang, Wenyin Liu
DSRT
2008
IEEE
14 years 2 months ago
Simulation Driven Experiment Control in Driver Assistance Assessment
Embedded systems technologies and advances in micro electronics have accelerated the evolution of driver assistance systems towards more driving safety, comfort, entertainment and...
Andreas Riener, Alois Ferscha