Browsing Journals and Magazines by Year "1991"

Sort by: Order: Results:

  • Russell, AD; Ranasinghe, M [Article-Full-text]
    A deterministic analysis framework that permits the computation of an upper bound on the constant dollar expenditure that should be made to fast-track a project to achieve a specified duration is presented. It employs a ...
  • Snapp, SR; Brentano, J; Dias, G; Goan, TL; Heberlein, LT; Ho, CL; Levitt, KN
    Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators. The proliferation of heterogeneous computer networks provides ...
  • Siyambalapitiya, DJT; Rajapakse, STK; de Mel, SJS; Fernando, SIT; Perera, BLPP [Article-Full-text]
    Extension of the power grid to rural and remote locations in a country has to be considered after detailed evaluation of technical, economic, and social implications. The use of conventional economic analytical techniques ...
  • Snapp, S; Brentano, J; Dias, G; Grance, T; Heberlein, T; Ho, CL; Levitt, KN; Mukherjee, B; Mansur, DL; Pon, KL; Smaha, SE
    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solv-ing ...
  • Heberlein, LT; Mukherjee, B; Levitt, K; Dias, G; Mansur, D [Article-Abstract]
    To date, current authentication and access control mechanisms have been shown to be insufficient for preventing intrusive activity in computer systems. Frequent media reports, and now our own research, have shown the ...