Sciweavers

DOLAP
2003
ACM
14 years 1 months ago
Advanced visualization for OLAP
Data visualization is one of the big issues of database research. OLAP as a decision support technology is highly related to the developments of data visualization area. In this p...
Andreas S. Maniatis, Panos Vassiliadis, Spiros Ski...
DOLAP
2003
ACM
14 years 1 months ago
Spatial hierarchy and OLAP-favored search in spatial data warehouse
Data warehouse and Online Analytical Processing(OLAP) play a key role in business intelligent systems. With the increasing amount of spatial data stored in business database, how ...
Fangyan Rao, Long Zhang, Xiulan Yu, Ying Li, Ying ...
DOLAP
2003
ACM
14 years 1 months ago
Implementing operations to navigate semantic star schemas
In the last years, lots of work have been devoted to multidimensional modeling, star shape schemas and OLAP operations. However, “drill-across” has not captured as much attent...
Alberto Abelló, José Samos, Fè...
IAW
2003
IEEE
14 years 1 months ago
Methodology of Risk Assessment in Mobile Agent System Design
Ingo McLean, Boleslaw K. Szymanski, Alan Bivens
IAW
2003
IEEE
14 years 1 months ago
The Kerf toolkit for intrusion analysis
Javed A. Aslam, Sergey Bratus, David Kotz, Ronald ...
IAW
2003
IEEE
14 years 1 months ago
Static Verification of Worm and virus Behavior in binary Executables using Model Checking
- Use offormal methods in any application scenario requires a precise characterization and representation of the properties that need to be verified The target, which is desired ri...
Prabhat K. Singh, Arun Lakhotia
IAW
2003
IEEE
14 years 1 months ago
Detecting Insider Threats by Monitoring System Call Activity
Nam T. Nguyen, Peter L. Reiher, Geoffrey H. Kuenni...
IAW
2003
IEEE
14 years 1 months ago
Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency
— The Computational Resiliency library (CRLib) provides distributed systems with the ability to sustain operation and dynamically restore the level of assurance in system functio...
Norka B. Lucena, Steve J. Chapin, Joohan Lee
IAW
2003
IEEE
14 years 1 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...