Sciweavers

3812 search results - page 640 / 763
» Combinations of TRAP Based Systems
Sort
View
VLDB
2004
ACM
113views Database» more  VLDB 2004»
15 years 10 months ago
Auditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensiti...
Rakesh Agrawal, Roberto J. Bayardo Jr., Christos F...
WEBI
2004
Springer
15 years 10 months ago
TSSP: A Reinforcement Algorithm to Find Related Papers
Content analysis and citation analysis are two common methods in recommending system. Compared with content analysis, citation analysis can discover more implicitly related papers...
Shen Huang, Gui-Rong Xue, Benyu Zhang, Zheng Chen,...
ACSAC
2003
IEEE
15 years 10 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
HAPTICS
2003
IEEE
15 years 10 months ago
Performance and Co-Presence in Heterogeneous Haptic Collaboration
Based on a distributed architecture for real-time collection and broadcast of haptic information to multiple participants, heterogeneous haptic devices (the PHANToM and the CyberG...
Margaret McLaughlin, Gaurav S. Sukhatme, Wei Peng,...
139
Voted
IAW
2003
IEEE
15 years 10 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...