Sciweavers

4971 search results - page 138 / 995
» Observation systems
Sort
View
ACSAC
2004
IEEE
14 years 1 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
WCW
2004
Springer
14 years 3 months ago
Bottlenecks and Their Performance Implications in E-commerce Systems
Abstract. We present a detailed workload characterization of a multi-tiered system that hosts an e-commerce site. Using the TPC-W workload and via experimental measurements, we ill...
Qi Zhang, Alma Riska, Erik Riedel, Evgenia Smirni
INTERACT
2003
13 years 11 months ago
3D Model Viewer with Real-time Viewpoint Tracking System
: Today, it has become very popular to represent 3D CG models onto the screen of a workstation or personal computer. In almost all software that displays 3D models, users can contr...
Jun Iio, Tomoyuki Yatabe, Kazuo Hiyane
HCI
2009
13 years 8 months ago
Studying Reactive, Risky, Complex, Long-Spanning, and Collaborative Work: The Case of IT Service Delivery
Abstract. IT service delivery is challenging to study. It is characterized by interacting systems of technology, people, and organizations. The work is sometimes reactive, sometime...
Eser Kandogan, Eben M. Haber, John H. Bailey, Paul...
AINA
2010
IEEE
14 years 2 months ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...