Sciweavers

18697 search results - page 3684 / 3740
» Systemic Security Management
Sort
View
RAID
2004
Springer
15 years 9 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
BIBE
2003
IEEE
133views Bioinformatics» more  BIBE 2003»
15 years 9 months ago
A Computational Pipeline for Protein Structure Prediction and Analysis at Genome Scale
The tertiary (3D) structure of a protein contains the essential information for understanding the biological function of the protein at the molecular and cellular levels. Traditio...
Manesh J. Shah, Sergei Passovets, Dongsup Kim, Kyl...
DISCEX
2003
IEEE
15 years 9 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes
EUROMICRO
2003
IEEE
15 years 9 months ago
Web Service Composition Languages: Old Wine in New Bottles?
Recently, several languages for web service composition have emerged (e.g., BPEL4WS and WSCI). The goal of these languages is to glue web services together in a process-oriented w...
Wil M. P. van der Aalst, Marlon Dumas, Arthur H. M...
HICSS
2003
IEEE
135views Biometrics» more  HICSS 2003»
15 years 9 months ago
Market Entry Strategies of Application Service Providers: Identifying Strategic Differentiation
In the last few years there has been much interest in the delivery of software-as-a-service. The concept of the remote delivery of software by Application Service Providers (ASPs)...
Bhavini Desai, Vishanth Weerakkody, Wendy Currie, ...
« Prev « First page 3684 / 3740 Last » Next »