Sciweavers

1099 search results - page 213 / 220
» Evaluating Integration Architectures - A Scenario-Based Eval...
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 8 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
PERCOM
2008
ACM
13 years 8 months ago
P2P multicast for pervasive ad hoc networks
Integrating p2p services in multi-hop ad hoc networks is today a hot topic. General multi-hop , and pervasive systems in particular, can greatly benefit from high-level middleware...
Franca Delmastro, Andrea Passarella, Marco Conti
IMCS
2007
77views more  IMCS 2007»
13 years 8 months ago
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by co...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
VLSISP
2008
203views more  VLSISP 2008»
13 years 8 months ago
FPGA-based System for Real-Time Video Texture Analysis
This paper describes a novel system for real-time video texture analysis. The system utilizes hardware to extract 2nd -order statistical features from video frames. These features ...
Dimitrios E. Maroulis, Dimitrios K. Iakovidis, Dim...
VLDB
1998
ACM
170views Database» more  VLDB 1998»
13 years 8 months ago
Advanced Data Processing in KRISYS: Modeling Concepts, Implementation Techniques, and Client/Server Issues
The increasing power of modern computers steadily opens up new application domains for advanced data processing such as engineering and knowledge-based applications. To meet their...
Stefan Deßloch, Theo Härder, Nelson Men...