Sciweavers

2550 search results - page 426 / 510
» Enterprise Content Management
Sort
View
IH
2001
Springer
15 years 9 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
148
Voted
RAID
2001
Springer
15 years 9 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
VLDB
2001
ACM
104views Database» more  VLDB 2001»
15 years 9 months ago
Cache Fusion: Extending Shared-Disk Clusters with Shared Caches
Cache Fusion TM is a fundamental component of Oracle’s Real Application Cluster configuration, a shared-cache clustered-database architecture that transparently extends databas...
Tirthankar Lahiri, Vinay Srihari, Wilson Chan, N. ...
ISCC
2000
IEEE
160views Communications» more  ISCC 2000»
15 years 9 months ago
The Adaptive Load Service (ALS): An ABR-Like Service for the Internet
In this paper, we present a novel approach for realizing adaptive QoS control in the Internet called the adaptive load service (ALS). ALS was designed in a similar fashion to the ...
Dorgham Sisalem, Henning Schulzrinne
ACMSE
2000
ACM
15 years 8 months ago
Hyperscenarios: a framework for active narrative
Scenarios are narratives that illustrate future possibilities, such as proposed systems or plans, and help policy makers and designers choose among alternative courses of action. ...
Reginald L. Hobbs, Colin Potts