Sciweavers

2742 search results - page 489 / 549
» Business Service Scheduling
Sort
View
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
14 years 1 days ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
13 years 12 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
DOCENG
2008
ACM
13 years 12 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
DSN
2008
IEEE
13 years 12 months ago
Enhanced server fault-tolerance for improved user experience
Interactive applications such as email, calendar, and maps are migrating from local desktop machines to data centers due to the many advantages offered by such a computing environ...
Manish Marwah, Shivakant Mishra, Christof Fetzer
ECAI
2008
Springer
13 years 12 months ago
Using Rules for the Integration of Heterogeneous and Autonomous, Context-Aware Systems
In this paper we introduce NUBIA, a middleware that combines, through business rules, information generated by heterogeneous and autonomous systems. Communication between NUBIA and...
David Mosén, Arantza Illarramendi, Mohand-S...