Sciweavers

902 search results - page 109 / 181
» Opening Address
Sort
View
EUROSEC
2010
ACM
14 years 2 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
DSRT
2003
IEEE
14 years 2 months ago
An Agent Architecture for Network Support of Distributed Simulation Systems
Continued research into distributed agent-based systems and evolving web based technologies are opening up tremendous possibilities for the deployment of large scale and highly ex...
Robert Simon, Woan Sun Chang, J. Mark Pullen
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
14 years 2 months ago
Token Dispensers for GSS Race Conditions: Locking Things That Don't Exist
A technological challenge that distinguishes group support systems (GSS) from many other technologies is the need to accommodate a variety of race conditions. A race condition occ...
Robert O. Briggs, Tomas P. Gregory
ICSM
2003
IEEE
14 years 2 months ago
Populating a Release History Database from Version Control and Bug Tracking Systems
Version control and bug tracking systems contain large amounts of historical information that can give deep insight into the evolution of a software project. Unfortunately, these ...
Michael Fischer, Martin Pinzger, Harald Gall
INFOVIS
2003
IEEE
14 years 2 months ago
EdgeLens: An Interactive Method for Managing Edge Congestion in Graphs
An increasing number of tasks require people to explore, navigate and search extremely complex data sets visualized as graphs. Examples include electrical and telecommunication ne...
Nelson Wong, M. Sheelagh T. Carpendale, Saul Green...