Sciweavers

581 search results - page 67 / 117
» policy 2009
Sort
View
DGO
2009
151views Education» more  DGO 2009»
13 years 9 months ago
Making ecology research results useful for resource management: a case study in visual analytics
This paper addresses challenges to resource managers' use of scientific research, and reports strategies and informatics tools to ameliorate those challenges. Our work involv...
Natalie Kopytko, Judith Bayard Cushing, Lee Zeman,...
CCS
2009
ACM
14 years 9 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
ICWS
2009
IEEE
14 years 5 months ago
A Governance Model for SOA
Currently, business requirements for rapid operational efficiency, customer responsiveness as well as rapid adaptability are driving the need for ever increasing communication and...
Pierre de Leusse, Theodosis Dimitrakos, David Bros...
ACSAC
2009
IEEE
14 years 3 months ago
Surgically Returning to Randomized lib(c)
—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X) and address space layout randomization (ASLR) are typically used in combination. T...
Giampaolo Fresi Roglia, Lorenzo Martignoni, Robert...
AICT
2009
IEEE
164views Communications» more  AICT 2009»
14 years 3 months ago
A Method of Admission Control Based on Both Resource Requests and Traffic Measurement and Its Dynamics under On/Off Model Traffi
Abstract: A method of admission control based on both resource requests by applications and class-based traffic measurement results was developed. In this method, a wide range of a...
Yasusi Kanada