Sciweavers

294 search results - page 26 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
BPSC
2010
194views Business» more  BPSC 2010»
13 years 7 months ago
Ad-hoc Management Capabilities for Distributed Business Processes
: Advanced business processes are mostly distributed and require highly flexible management capabilities. In such scenarios, process parts often leave their initiator’s direct sp...
Sonja Zaplata, Dirk Bade, Kristof Hamann, Winfried...
INTERACT
2003
13 years 10 months ago
The Process of Developing a Mobile Device for Communication in a Safety-Critical Domain
: This paper describes the process of developing an interactive mobile system for use in a safety-critical domain. The system was developed to inquire into the extent of which coor...
Jesper Kjeldskov, Jan Stage
EUROSYS
2011
ACM
13 years 3 days ago
Refuse to crash with Re-FUSE
We introduce Re-FUSE, a framework that provides support for restartable user-level file systems. Re-FUSE monitors the user-level file-system and on a crash transparently restart...
Swaminathan Sundararaman, Laxman Visampalli, Andre...
HICSS
2008
IEEE
172views Biometrics» more  HICSS 2008»
14 years 3 months ago
Semantic Web Services Monitoring: An OWL-S Based Approach
In this paper we describe mechanisms for execution monitoring of semantic web services, based on OWL-S. The use of semantic descriptions and ontologies is a valuable extension to ...
Roman Vaculín, Katia P. Sycara
COMCOM
2004
149views more  COMCOM 2004»
13 years 8 months ago
Accelerating network security services with fast packet classification
To protect a network, secure network systems such as intrusion detection system (IDS) and firewall are often installed to control or monitor network traffic. These systems often i...
Shiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin