Sciweavers

2310 search results - page 273 / 462
» Managing System and Active-Content Integrity
Sort
View
BMCBI
2007
123views more  BMCBI 2007»
13 years 8 months ago
BIRCH: A user-oriented, locally-customizable, bioinformatics system
Background: Molecular biologists need sophisticated analytical tools which often demand extensive computational resources. While finding, installing, and using these tools can be ...
Brian Fristensky
SIGOPSE
1998
ACM
14 years 11 days ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...
ICETE
2004
204views Business» more  ICETE 2004»
13 years 9 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
CIKM
1999
Springer
14 years 12 days ago
Architecture of a Networked Image Search and Retrieval System
Large scale networked image retrieval systems face a number of problems that are not fully satis ed by current systems. On one hand, integrated solutions that store all image data...
Roger Weber, Jürg Bolliger, Thomas R. Gross, ...
EDBTW
2010
Springer
14 years 3 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...