Sciweavers

134 search results - page 23 / 27
» Detecting Clones in Business Applications
Sort
View
OTM
2005
Springer
14 years 3 months ago
QoS-Based Service Selection and Ranking with Trust and Reputation Management
Abstract. QoS-based service selection mechanisms will play an essential role in service-oriented architectures, as e-Business applications want to use services that most accurately...
Le-Hung Vu, Manfred Hauswirth, Karl Aberer
ACSAC
2006
IEEE
14 years 3 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
TRIDENTCOM
2010
IEEE
13 years 7 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
VLDB
2004
ACM
111views Database» more  VLDB 2004»
14 years 3 months ago
Technology Challenges in a Data Warehouse
This presentation will discuss several database technology challenges that are faced when building a data warehouse. It will touch on the challenges posed by high capacity drives ...
Ramesh Bhashyam
MOBISYS
2005
ACM
14 years 9 months ago
MediaAlert: a broadcast video monitoring and alerting system for mobile users
? We present a system for automatic monitoring and timely dissemination of multimedia information to a range of mobile information appliances based on each user's interest pro...
Bin Wei, Bernard Renger, Yih-Farn Chen, Rittwik Ja...