Sciweavers

342 search results - page 57 / 69
» The design of a generic framework for integrating ECA compon...
Sort
View
ACSAC
2000
IEEE
13 years 12 months ago
Security Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly ar...
M. Petkac, Lee Badger
PUK
2001
13 years 9 months ago
Web-based Commerce of Complex Products and Services with Multiple Suppliers
The sales of customisable products and services over the internet is a challenging task within the area of electronic commerce. In this chapter we will present a case study which s...
Liliana Ardissono, Alexander Felfernig, Gerhard Fr...
DAIS
2008
13 years 8 months ago
Using Object Replication for Building a Dependable Version Control System
Object-oriented technologies are frequently used to design and implement distributed applications. Object replication is a well-established approach to increase the dependability f...
Rüdiger Kapitza, Peter Baumann, Hans P. Reise...
CONSTRAINTS
2004
116views more  CONSTRAINTS 2004»
13 years 7 months ago
Decision Tradeoff Using Example-Critiquing and Constraint Programming
We consider constructive preference elicitation for decision aid systems in applications such as configuration or electronic catalogs. We are particularly interested in supporting ...
Pearl Pu, Boi Faltings
IPPS
2007
IEEE
14 years 1 months ago
Topaz: Extending Firefox to Accommodate the GridFTP Protocol
As grid infrastructures mature, an increasing challenge is to provide end-user scientists with intuitive interfaces to computational services, data management capabilities, and vi...
Richard Zamudio, Daniel Catarino, Michela Taufer, ...