Sciweavers

2693 search results - page 457 / 539
» French Order Without Order
Sort
View
VIZSEC
2004
Springer
14 years 3 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
VLDB
2004
ACM
93views Database» more  VLDB 2004»
14 years 3 months ago
Symmetric Relations and Cardinality-Bounded Multisets in Database Systems
In a binary symmetric relationship, A is related to B if and only if B is related to A. Symmetric relationships between k participating entities can be represented as multisets of...
Kenneth A. Ross, Julia Stoyanovich
FTDCS
2003
IEEE
14 years 3 months ago
Autonomous Transaction Processing Using Data Dependency in Mobile Environments
Mobile clients retrieve and update databases at servers. They use transactions in order to ensure the consistency of shared data in the presence of concurrent accesses. Transactio...
IlYoung Chung, Bharat K. Bhargava, Malika Mahoui, ...
HICSS
2003
IEEE
84views Biometrics» more  HICSS 2003»
14 years 3 months ago
Constructing Electronic Marketplaces using Peer-to-Peer Technology
Due to the widespread appearance of filesharing systems like Napster, the peer-to-peer concept has recently become well known. So far, these file-sharing systems have been used fo...
Nick Gehrke, Matthias Schumann
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 3 months ago
The Impact of Stimulus Diversity on Creative Solution Generation: An Evaluation of the Cognitive Network Model of Creativity
Creativity is essential to an organization’s survival. In order to remain productive and adaptive, an organization’s members must devise creative solutions – solutions that ...
Eric L. Santanen, Robert O. Briggs, Gert-Jan de Vr...