Sciweavers

543 search results - page 45 / 109
» FMC: An Approach Towards Architecture-Centric System Develop...
Sort
View
TEC
2002
166views more  TEC 2002»
13 years 8 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
IPPS
1999
IEEE
14 years 1 months ago
An Approach for Measuring IP Security Performance in a Distributed Environment
Abstract. The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brought about by increased automation requir...
Brett L. Chappell, David T. Marlow, Philip M. Irey...
DISCEX
2003
IEEE
14 years 2 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
ICADL
2003
Springer
145views Education» more  ICADL 2003»
14 years 2 months ago
Towards Web Mining of Query Translations for Cross-Language Information Retrieval in Digital Libraries
This paper proposes an efficient client-server-based query translation approach to allowing more feasible implementation of cross-language information retrieval (CLIR) services in ...
Wen-Hsiang Lu, Jenq-Haur Wang, Lee-Feng Chien
ISN
1999
Springer
112views Communications» more  ISN 1999»
14 years 1 months ago
Modelling Management Components for Reuse Using UML
The competitive pressures of the telecoms sector are leading to a major push towards the automation and integration of many operational support processes. This creates pressures to...
David Lewis, Chris Malbon, Alina DaCruz