Sciweavers

501 search results - page 64 / 101
» Redundancy and Diversity in Security
Sort
View
HICSS
2009
IEEE
113views Biometrics» more  HICSS 2009»
14 years 2 months ago
Digital Forensics: Defining a Research Agenda
While many fields have well-defined research agendas, evolution of the field of digital forensics has been largely driven by practitioners in the field. As a result, the majority ...
Kara L. Nance, Brian Hay, Matt Bishop
IWIA
2005
IEEE
14 years 1 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
VLDB
2005
ACM
132views Database» more  VLDB 2005»
14 years 1 months ago
MIX: A Meta-data Indexing System for XML
We present a system for efficient meta-data indexed querying of XML documents. Given the diversity of the information available in XML, it is very useful to annotate XML data wit...
SungRan Cho, Nick Koudas, Divesh Srivastava
ACMSE
2004
ACM
14 years 1 months ago
Role of the resource broker in the Grid
Today, as Grid Computing is becoming a reality, there is a need for managing and monitoring the available resources worldwide, as well as the need for conveying these resources to...
Enis Afgan
ISI
2004
Springer
14 years 1 months ago
Generating Concept Hierarchies from Text for Intelligence Analysis
It is important to automatically extract key information from sensitive text documents for intelligence analysis. Text documents are usually unstructured and information extraction...
Jenq-Haur Wang, Chien-Chung Huang, Jei-Wen Teng, L...