Sciweavers

427 search results - page 69 / 86
» Monitoring and controlling of a multi - agent based workflow...
Sort
View
ICETE
2004
204views Business» more  ICETE 2004»
13 years 9 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
SASO
2008
IEEE
14 years 2 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
VISUALIZATION
2002
IEEE
14 years 19 days ago
Face-based Luminance Matching for Perceptual Colormap Generation
Most systems used for creating and displaying colormap-based visualizations are not photometrically calibrated. That is, the relationship between RGB input levels and perceived lu...
Gordon L. Kindlmann, Erik Reinhard, Sarah Creem
MDM
2007
Springer
147views Communications» more  MDM 2007»
14 years 1 months ago
Collaboratively Querying Sensor Networks through Handheld Devices
We envision that in some wireless sensor network applications, such as environmental monitoring, assisted living, and industrial control, handheld devices will be used from time t...
Tsz Wai Chiu, Qiong Luo
IPPS
2005
IEEE
14 years 1 months ago
Automated Analysis of Memory Access Behavior
Abstract— We developed an automated environment to measure the memory access behavior of applications on high performance clusters. Code optimization for processor caches is cruc...
Michael Gerndt, Tianchao Li