Sciweavers

6952 search results - page 1265 / 1391
» The information integrity imperative
Sort
View
DISCEX
2003
IEEE
14 years 3 months ago
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering
We describe "NetBouncer", an approach and set of technologies for providing practical and highperformance defenses against distributed denial-ofservice (DDoS) attacks. T...
Roshan K. Thomas, Brian L. Mark, Tommy Johnson, Ja...
GROUP
2003
ACM
14 years 2 months ago
Concepts for usable patterns of groupware applications
Patterns, which are based on in-depth practical experience, can be instructing for the design of groupware applications as sociotechnical systems. On the basis of a summary of the...
Thomas Herrmann, Marcel Hoffmann, Isa Jahnke, Andr...
MMDB
2003
ACM
132views Multimedia» more  MMDB 2003»
14 years 2 months ago
Image database retrieval utilizing affinity relationships
Recent research effort in Content-Based Image Retrieval (CBIR) focuses on bridging the gap between low-level features and highlevel semantic contents of images as this gap has bec...
Mei-Ling Shyu, Shu-Ching Chen, Min Chen, Chengcui ...
MOBIDE
2003
ACM
14 years 2 months ago
Consistency mechanisms for a distributed lookup service supporting mobile applications
This paper presents a general-purpose distributed lookup service, denoted Passive Distributed Indexing (PDI). PDI stores entries in form of (key, value) pairs in index caches loca...
Christoph Lindemann, Oliver P. Waldhorst
SACMAT
2003
ACM
14 years 2 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
« Prev « First page 1265 / 1391 Last » Next »