Sciweavers

1052 search results - page 122 / 211
» Foundations for Virtual Types
Sort
View
COSIT
1997
Springer
115views GIS» more  COSIT 1997»
14 years 1 months ago
Qualitative Representation of Change
Current geographic information systems (GISs) have been designed for querying and maintaining static databases representing static phenomena and give little support to those users ...
Kathleen Hornsby, Max J. Egenhofer
GLOBECOM
2009
IEEE
14 years 21 days ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
ACSAC
2004
IEEE
14 years 17 days ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
ER
2000
Springer
151views Database» more  ER 2000»
14 years 13 days ago
Algebraic Database Migration to Object Technology
Relational database systems represent the current standard technology for implementing database applications. Now that the object-oriented paradigm becomes more and more mature in...
Andreas Behm, Andreas Geppert, Klaus R. Dittrich
DOCENG
2008
ACM
13 years 10 months ago
A concise XML binding framework facilitates practical object-oriented document engineering
Semantic web researchers tend to assume that XML Schema and OWL-S are the correct means for representing the types, structure, and semantics of XML data used for documents and int...
Andruid Kerne, Zachary O. Toups, Blake Dworaczyk, ...