Sciweavers

3601 search results - page 559 / 721
» The Future of Virtualization Technology
Sort
View
SISW
2005
IEEE
14 years 2 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
SISW
2005
IEEE
14 years 2 months ago
The Consequences of Decentralized Security in a Cooperative Storage System
Traditional storage systems have considered security as a problem to be solved at the perimeter: once a user is authenticated, each device internal to the system trusts the decisi...
Douglas Thain, Christopher Moretti, Paul Madrid, P...
WECWIS
2005
IEEE
107views ECommerce» more  WECWIS 2005»
14 years 2 months ago
A Semantic Web Based Architecture for Analytical Tools
Despite the importance of analytical tools to organizations, there are challenges that should be tackled in order to leverage the impact of those tools in the decision making proc...
Denilson Sell, Liliana Cabral, Enrico Motta, John ...
HT
2005
ACM
14 years 2 months ago
Parsing and interpreting ambiguous structures in spatial hypermedia
When reflecting on information, spatial hypermedia users express their understanding of the information’s structure visually. In order to facilitate this process, spatial hyperm...
Luis Francisco-Revilla, Frank M. Shipman III
IMC
2005
ACM
14 years 2 months ago
Combining Filtering and Statistical Methods for Anomaly Detection
In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that...
Augustin Soule, Kavé Salamatian, Nina Taft