Sciweavers

1191 search results - page 208 / 239
» Distributed Detection of Information Flows
Sort
View
HICSS
2009
IEEE
120views Biometrics» more  HICSS 2009»
14 years 2 months ago
Trapping Malicious Insiders in the SPDR Web
The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...
UIC
2009
Springer
14 years 2 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
ICDCSW
2007
IEEE
14 years 1 months ago
Event Stream Processing with Out-of-Order Data Arrival
Complex event processing has become increasingly important in modern applications, ranging from supply chain management for RFID tracking to real-time intrusion detection. The goa...
Ming Li, Mo Liu, Luping Ding, Elke A. Rundensteine...
ESCIENCE
2006
IEEE
14 years 1 months ago
Monitoring the Earth System Grid with MDS4
In production Grids for scientific applications, service and resource failures must be detected and addressed quickly. In this paper, we describe the monitoring infrastructure use...
Ann L. Chervenak, Jennifer M. Schopf, Laura Pearlm...
ETFA
2006
IEEE
14 years 1 months ago
Investigating Connector Faults in the Time-Triggered Architecture
In the context of distributed real-time systems as deployed in the avionic and the automotive domain a substantial number of system malfunctions result from connector faults. For ...
Philipp Peti, Roman Obermaisser, Harald Paulitsch