Sciweavers

249 search results - page 38 / 50
» What Do You Mean
Sort
View
SYNTHESE
2010
87views more  SYNTHESE 2010»
13 years 5 months ago
Proofs, pictures, and Euclid
Though pictures are often used to present mathematical arguments, they are not typically thought to be an acceptable means for presenting mathematical arguments rigorously. With re...
John Mumma
IJMSO
2007
109views more  IJMSO 2007»
13 years 7 months ago
MOQ: Web services ontologies for QoS and general quality evaluations
When describing Web services, one of the obvious aspects that needs representing is Quality of Service” (QoS), the capability of a Web service to meet an acceptable level of ser...
Henry M. Kim, Arijit Sengupta, Joerg Evermann
COORDINATION
2007
Springer
14 years 1 months ago
Requirements for Routing in the Application Layer
In the application layer of networks, many application servers are middleboxes in the paths of messages from source to destination. Applications require, as a basic coordination me...
Pamela Zave
RAID
1999
Springer
13 years 11 months ago
IDS Standards: Lessons Learned to Date
: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
Stuart Staniford-Chen
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 7 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki