Sciweavers

1352 search results - page 44 / 271
» Designing Security Requirements Models Through Planning
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
HPCN
1999
Springer
14 years 1 months ago
Towards a Scalable Metacomputing Storage Service
We describe a prototypical storage service through which we are addressing some of the open storage issues in wide-area distributed high-performance computing. We discuss some of t...
Craig J. Patten, Kenneth A. Hawick, J. F. Hercus
ECAI
2004
Springer
14 years 2 months ago
APPROACH: Decentralised Rotation Planning for Container Barges
This paper presents the engineering and development process of a software tool (APPROACH) that is designed for decentralised rotation planning for container barges in the port of R...
Martijn C. Schut, Michael Kentrop, Mark Leenaarts,...
SG
2005
Springer
14 years 2 months ago
Virtual Camera Planning: A Survey
Modelling, animation and rendering has dominated research computer graphics yielding increasingly rich and realistic virtual worlds. The complexity, richness and quality of the vir...
Marc Christie, Rumesh Machap, Jean-Marie Normand, ...
ACSAC
2004
IEEE
14 years 17 days ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia