Sciweavers

2270 search results - page 239 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
COMSUR
2008
169views more  COMSUR 2008»
15 years 4 months ago
Peer-to-peer-based resource discovery In global grids: A tutorial
Efficient Resource discovery mechanism is one of the fundamental requirement for Grid computing systems, as it aids in resource management and scheduling of applications. Resource...
Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya
SAFECOMP
1998
Springer
15 years 8 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
SEUS
2008
IEEE
15 years 11 months ago
A Two-Layered Management Architecture for Building Adaptive Real-Time Systems
The concepts of Autonomic and Organic Computing (AC/OC) promise to make modern computer systems more secure and easier to manage. In this paper, we extend the observer/controller a...
Florian Kluge, Sascha Uhrig, Jörg Mische, The...
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 5 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
IMSA
2001
121views Multimedia» more  IMSA 2001»
15 years 6 months ago
Technology Integrated Learning Environment - A Web-based Distance Learning System
This paper analyses the requirements of a third-generation technology integrated learning environment. The architecture proposed is analysed in terms of the generic constraints of...
Regina Gehne, Chris R. Jesshope, Zhenzi Zhang