Sciweavers

3089 search results - page 425 / 618
» services 2008
Sort
View
143
Voted
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 3 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin
CORR
2008
Springer
169views Education» more  CORR 2008»
15 years 3 months ago
Congestion Reduction Using Ad hoc Message Dissemination in Vehicular Networks
Abstract-- Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITS) and locationaware services [1]. The ability to disseminate information ...
Thomas D. Hewer, Maziar Nekovee
CORR
2008
Springer
102views Education» more  CORR 2008»
15 years 3 months ago
An MAS-Based ETL Approach for Complex Data
: In a data warehousing process, the phase of data integration is crucial. Many methods for data integration have been published in the literature. However, with the development of...
Omar Boussaid, Fadila Bentayeb, Jérôm...
CORR
2008
Springer
104views Education» more  CORR 2008»
15 years 3 months ago
Interoperability between Heterogeneous Federation Architectures: Illustration with SAML and WS-Federation
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architec...
Mikaël Ates, Christophe Gravier, Jér&e...
ISCA
2008
IEEE
101views Hardware» more  ISCA 2008»
15 years 3 months ago
Scalability in Analyzing the Availability of Large-Scale Networks using Multicast
The goal of this paper is to identify and discuss scalability issues for the measurement-based analysis of the availability in large-scale networks using IP multicast technology. ...
Falko Dressler