Sciweavers

2310 search results - page 273 / 462
» Managing System and Active-Content Integrity
Sort
View
111
Voted
BMCBI
2007
123views more  BMCBI 2007»
15 years 3 months ago
BIRCH: A user-oriented, locally-customizable, bioinformatics system
Background: Molecular biologists need sophisticated analytical tools which often demand extensive computational resources. While finding, installing, and using these tools can be ...
Brian Fristensky
133
Voted
SIGOPSE
1998
ACM
15 years 7 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...
143
Voted
ICETE
2004
204views Business» more  ICETE 2004»
15 years 5 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
115
Voted
CIKM
1999
Springer
15 years 8 months ago
Architecture of a Networked Image Search and Retrieval System
Large scale networked image retrieval systems face a number of problems that are not fully satis ed by current systems. On one hand, integrated solutions that store all image data...
Roger Weber, Jürg Bolliger, Thomas R. Gross, ...
118
Voted
EDBTW
2010
Springer
15 years 10 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...