Sciweavers

2337 search results - page 377 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
WWW
2004
ACM
14 years 9 months ago
ProThes: thesaurus-based meta-search engine for a specific application domain
In this poster we introduce ProThes, a pilot meta-search engine (MSE) for a specific application domain. ProThes combines three approaches: meta-search, graphical user interface (...
Pavel Braslavski, Gleb Alshanski, Anton Shishkin
ACMSE
2004
ACM
14 years 2 months ago
Role of the resource broker in the Grid
Today, as Grid Computing is becoming a reality, there is a need for managing and monitoring the available resources worldwide, as well as the need for conveying these resources to...
Enis Afgan
PERVASIVE
2006
Springer
13 years 9 months ago
The Smart Tachograph - Individual Accounting of Traffic Costs and Its Implications
Today, several costs caused by road traffic may either be only roughly approximated, or cannot be clearly assigned to the drivers causing them, or both. They are typically distribu...
Vlad Coroama
JDCTA
2010
143views more  JDCTA 2010»
13 years 3 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
MOBIDE
2005
ACM
14 years 2 months ago
A general methodology for context-aware data access
In this paper, we present an extensible approach to the adaptation of Web information delivery according to different and possibly heterogeneous contexts. The approach is based o...
Roberto De Virgilio, Riccardo Torlone