Sciweavers

136 search results - page 22 / 28
» Cross-organizational process monitoring based on service cho...
Sort
View
IADIS
2003
13 years 10 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire
DASFAA
2006
IEEE
153views Database» more  DASFAA 2006»
14 years 14 days ago
Dissemination of Dynamic Data: Semantics, Algorithms, and Performance
Abstract The Internet and the Web are increasingly used to disseminate fast changing data such as sensor data, traffic and weather information, stock prices, sports scores, and eve...
Krithi Ramamritham
IFIP
2005
Springer
14 years 2 months ago
Content-Based Image Retrieval for Digital Forensics
Digital forensic investigators are often faced with the task of manually examining a large number of (photographic) images in order to identify potential evidence. The task can be...
Yixin Chen, Vassil Roussev, Golden G. Richard III,...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
14 years 3 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
ECUMN
2004
Springer
14 years 2 months ago
Expedited Forwarding Delay Budget Through a Novel Call Admission Control
Abstract. Call admission control is a principal component for QoS delivery in IP networks. It determines the extent to which network resources are utilized. It determines also whet...
Hamada Alshaer, Eric Horlait