Sciweavers

981 search results - page 63 / 197
» Personalization and User Profile Management
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
15 years 2 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 6 months ago
UNIT: User-centric Transaction Management in Web-Database Systems
Web-database systems are nowadays an integral part of everybody's life, with applications ranging from monitoring/trading stock portfolios, to personalized blog aggregation a...
Alexandros Labrinidis, Daniel Mossé, Huimin...
MHCI
2005
Springer
15 years 10 months ago
ZuiScat: querying and visualizing information spaces on personal digital assistants
ZuiScat is a visualization concept for querying large information spaces on Personal Digital Assistants (PDA). Retrieval results are presented in a dynamic scatterplot, which is e...
Thorsten Büring, Harald Reiterer
ACSAC
2009
IEEE
15 years 8 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
ENTCS
2008
94views more  ENTCS 2008»
15 years 4 months ago
Monitoring External Resources in Java MIDP
We present a Java library for mobile phones which tracks and controls at runtime the use of potentially costly resources, such as premium rate text messages. This improves on the ...
David Aspinall, Patrick Maier, Ian Stark