Sciweavers

2874 search results - page 549 / 575
» Intrusion Detection: Systems and Models
Sort
View
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
14 years 3 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury
INFOCOM
2005
IEEE
14 years 3 months ago
Reduction of quality (RoQ) attacks on Internet end-systems
— Current computing systems depend on adaptation mechanisms to ensure that they remain in quiescent operating regions. These regions are often defined using efficiency, fairnes...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
MIR
2005
ACM
181views Multimedia» more  MIR 2005»
14 years 3 months ago
Video booklet: a natural video searching and browsing interface
In this paper, we propose a novel system, named Video Booklet, which enables efficient and natural personal video browsing and searching. In the system, firstly representative th...
Cai-Zhi Zhu, Xian-Sheng Hua, Tao Mei, Xiuqing Wu
VLDB
2004
ACM
108views Database» more  VLDB 2004»
14 years 3 months ago
QStream: Deterministic Querying of Data Streams
Current developments in processing data streams are based on the best-effort principle and therefore not adequate for many application areas. When sensor data is gathered by inte...
Sven Schmidt, Henrike Berthold, Wolfgang Lehner
EUROSYS
2009
ACM
14 years 7 months ago
Automated control of multiple virtualized resources
: Virtualized data centers enable consolidation of multiple applications and sharing of multiple resources among these applications. However, current virtualization technologies ar...
Pradeep Padala, Kai-Yuan Hou, Kang G. Shin, Xiaoyu...