Sciweavers

652 search results - page 120 / 131
» Mathematical knowledge management is needed
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 6 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
CGA
2011
13 years 1 months ago
Visualization at Supercomputing Centers: The Tale of Little Big Iron and the Three Skinny Guys
Supercomputing Centers (SC’s) are unique resources that aim to enable scientific knowledge discovery through the use of large computational resources, the Big Iron. Design, acq...
E. Wes Bethel, John Van Rosendale, Dale Southard, ...
DGO
2011
237views Education» more  DGO 2011»
12 years 6 months ago
Modeling digital preservation capabilities in enterprise architecture
The rising awareness of the challenges of preserving information over the long term has led to a wealth of initiatives developing economic models, methods, tools, systems, guideli...
Christoph Becker, Gonçalo Antunes, Jos&eacu...
SIGMOD
2004
ACM
163views Database» more  SIGMOD 2004»
14 years 6 months ago
Rank-aware Query Optimization
Ranking is an important property that needs to be fully supported by current relational query engines. Recently, several rank-join query operators have been proposed based on rank...
Ihab F. Ilyas, Rahul Shah, Walid G. Aref, Jeffrey ...
STORAGESS
2005
ACM
14 years 8 days ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...