Sciweavers

468 search results - page 40 / 94
» The System Administration Maturity Model - SAMM
Sort
View
ICDM
2008
IEEE
142views Data Mining» more  ICDM 2008»
14 years 2 months ago
Clustering Events on Streams Using Complex Context Information
Monitoring applications play an increasingly important role in many domains. They detect events in monitored systems and take actions such as invoke a program or notify an adminis...
YongChul Kwon, Wing Yee Lee, Magdalena Balazinska,...
JSW
2008
98views more  JSW 2008»
13 years 8 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
ICONFERENCE
2012
12 years 3 months ago
Rural anchor institution broadband connectivity: enablers and barriers to adoption
This paper presents findings from two research projects that entail needs assessments, benchmarking, and onsite diagnostics of anchor institutions in support of multi-million doll...
Lauren H. Mandel, Nicole D. Alemanne, Charles R. M...
ICPPW
2002
IEEE
14 years 1 months ago
A Structural Framework for Modeling Multi-Stage Network Attacks
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Kristopher Daley, Ryan Larson, Jerald Dawkins
BPM
2004
Springer
114views Business» more  BPM 2004»
14 years 1 months ago
Modeling Medical E-services
On the one hand Web services are gaining increasing attention. A lot of standardization has improved their stability and range of application. Composition and coordination techniqu...
Rainer Anzböck, Schahram Dustdar