Sciweavers

1213 search results - page 233 / 243
» Enterprise information portals
Sort
View
CCS
2006
ACM
13 years 11 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
MKWI
2008
136views Business» more  MKWI 2008»
13 years 9 months ago
KASIMIR - Work process embedded task management leveraging the Semantic Desktop
: The effectiveness of semantic applications can be increased significantly if the system does not urge the users to take care of explicit semantic annotation creation. Today, sema...
Olaf Grebner, Ernie Ong, Uwe V. Riss
BDA
2003
13 years 9 months ago
Evaluating XQuery in a full-XML mediation architecture
: XML has emerged as the leading language for representing and exchanging data not only on the Web, but also in general in the enterprise. XQuery is emerging as the standard query ...
Tuyet-Tram Dang-Ngoc, Georges Gardarin
FIW
2003
120views Communications» more  FIW 2003»
13 years 9 months ago
A Policy Architecture for Enhancing and Controlling Features
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec, Kenneth J. Turner
CCR
2006
110views more  CCR 2006»
13 years 8 months ago
Estimating network proximity and latency
Network proximity and latency estimation is an important component in discovering and locating services and applications. With the growing number of services and service providers...
Puneet Sharma, Zhichen Xu, Sujata Banerjee, Sung-J...