Sciweavers

425 search results - page 60 / 85
» Audit
Sort
View
DISCEX
2003
IEEE
14 years 25 days ago
Surveillance Detection in High Bandwidth Environments
In this paper, we describe System Detection’s surveillance detection techniques for enclave environments (ESD) and peering center environments (PSD) and evaluate each technique ...
Seth Robertson, Eric V. Siegel, Matthew Miller, Sa...
HICSS
2003
IEEE
161views Biometrics» more  HICSS 2003»
14 years 25 days ago
Enhanced Knowledge Management with eXtensible Rule Markup Language
XML has become the standard platform for structured data exchange on the Web. Next concern of Semantic Web is the exchange of rules in markup language form. The rules should be re...
Jae Kyu Lee, Mye M. Sohn
HOTOS
2003
IEEE
14 years 25 days ago
Magpie: Online Modelling and Performance-aware Systems
Understanding the performance of distributed systems requires correlation of thousands of interactions between numerous components — a task best left to a computer. Today’s sy...
Paul Barham, Rebecca Isaacs, Richard Mortier, Dush...
SAINT
2003
IEEE
14 years 24 days ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
DEBS
2003
ACM
14 years 24 days ago
Information sharing with the Oracle database
Database systems have been designed to manage business critical information and make this information accessible on request to connected clients. There is, however, an ever-increa...
Dieter Gawlick, Shailendra Mishra