Sciweavers

2517 search results - page 252 / 504
» Secure Deployment of Components
Sort
View
136
Voted
WWW
2004
ACM
16 years 3 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
PTS
2007
120views Hardware» more  PTS 2007»
15 years 4 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
127
Voted
C5
2008
IEEE
15 years 9 months ago
Remote Opportunities: A Rethinking and Retooling
Introducing technology as a sustainable means of creating, connecting, and collaborating introduces the need to carefully consider subtle aspects of deployment strategies and supp...
Yagiz Onat Yazir, Katherine Gunion, Christopher Pe...
CCR
2004
155views more  CCR 2004»
15 years 2 months ago
The dark side of the Web: an open proxy's view
With the advent of large-scale, wide-area networking testbeds, researchers can deploy long-running services that interact with other resources on the Web. While such interaction c...
Vivek S. Pai, Limin Wang, KyoungSoo Park, Ruoming ...
120
Voted
DOLAP
2004
ACM
15 years 8 months ago
Physical modeling of data warehouses using UML
During the few last years, several approaches have been proposed to model different aspects of a Data Warehouse (DW), such as the conceptual model of the DW, the design of the ET...
Sergio Luján-Mora, Juan Trujillo