Sciweavers

98 search results - page 8 / 20
» Policy-Controlled Event Management for Distributed Intrusion...
Sort
View
DEBS
2008
ACM
13 years 8 months ago
Relative temporal constraints in the Rete algorithm for complex event detection
Complex Event Processing is an important technology for information systems with a broad application space ranging from supply chain management, systems monitoring, and stock mark...
Karen Walzer, Tino Breddin, Matthias Groch
IJISEC
2008
188views more  IJISEC 2008»
13 years 5 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
ICDE
2007
IEEE
209views Database» more  ICDE 2007»
14 years 1 months ago
Hierarchical Temporal Association Mining for Video Event Detection in Video Databases
With the proliferation of multimedia data and evergrowing requests for multimedia applications, new challenges are emerged for efficient and effective managing and accessing large...
Min Chen, Shu-Ching Chen, Mei-Ling Shyu
CCGRID
2006
IEEE
14 years 23 days ago
Closing Cluster Attack Windows Through Server Redundancy and Rotations
— It is well-understood that increasing redundancy in a system generally improves the availability and dependability of the system. In server clusters, one important form of redu...
Yih Huang, David Arsenault, Arun Sood
DAGSTUHL
2007
13 years 8 months ago
An XML Framework for Integrating Continuous Queries, Composite Event Detection, and Database Condition Monitoring for Multiple D
Abstract Current, data-driven applications have become more dynamic in nature, with the need to respond to events generated from distributed sources or to react to information extr...
Susan Darling Urban, Suzanne W. Dietrich, Yi Chen