Sciweavers

2340 search results - page 50 / 468
» Data abstraction and information hiding
Sort
View
VIIP
2001
13 years 11 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
CORR
2006
Springer
115views Education» more  CORR 2006»
13 years 10 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
INTERNET
2007
105views more  INTERNET 2007»
13 years 10 months ago
Workflow Planning on a Grid
evel of abstraction, we can represent a workflow as a directed graph with operators (or tasks) at the vertices (see Figure 1). Each operator takes inputs from data sources or from ...
Craig W. Thompson, Wing Ning Li, Zhichun Xiao
SEMWEB
2009
Springer
14 years 4 months ago
LinkedGeoData: Adding a Spatial Dimension to the Web of Data
Abstract. In order to employ the Web as a medium for data and information integration, comprehensive datasets and vocabularies are required as they enable the disambiguation and al...
Sören Auer, Jens Lehmann, Sebastian Hellmann
CONCUR
2009
Springer
14 years 4 months ago
Partial Order Reduction for Probabilistic Systems: A Revision for Distributed Schedulers
Abstract. The technique of partial order reduction (POR) for probabilistic model checking prunes the state space of the model so that a maximizing scheduler and a minimizing one pe...
Sergio Giro, Pedro R. D'Argenio, Luis María...