Sciweavers

495 search results - page 55 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
JSW
2008
98views more  JSW 2008»
13 years 9 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
ECUMN
2007
Springer
14 years 3 months ago
Enforcing Access Control Using Risk Assessment
Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. But in the ubiquitous environment...
Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungy...
SKG
2006
IEEE
14 years 3 months ago
Semantic Grid Services in K-Wf Grid
In this paper we present design and development of the semantic grid services for the flood forecasting simulations. We will highlight the corresponding architecture and the proc...
Marian Babik, Emil Gatial, Ondrej Habala, Ladislav...
ISMIR
2005
Springer
135views Music» more  ISMIR 2005»
14 years 3 months ago
Automatic X Traditional Descriptor Extraction: the Case of Chord Recognition
Audio descriptor extraction is the activity of finding mathematical models which describe properties of the sound, requiring signal processing skills. The scientific literature pr...
Giordano Ribeiro de Eulalio Cabral, Françoi...
PGLDB
2003
151views Database» more  PGLDB 2003»
13 years 11 months ago
Web-service-based, Dynamic and Collaborative E-learning
This paper describes an on-going effort to investigate problems and approaches for achieving Web-service-based, dynamic and collaborative e-learning. In this work, a Learning Cont...
Stanley Y. W. Su, Gilliean Lee