Sciweavers

358 search results - page 40 / 72
» A flexible network monitoring tool based on a data stream ma...
Sort
View
ACSAC
2002
IEEE
14 years 27 days ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
GIS
2010
ACM
13 years 6 months ago
Using location based social networks for quality-aware participatory data transfer
The sensing systems that monitor physical environments rely on communication infrastructures (wired or wireless) to collect data from the sensors embedded in the environment. Howe...
Houtan Shirani-Mehr, Farnoush Banaei Kashani, Cyru...
INFOCOM
1994
IEEE
14 years 1 days ago
Scheduling Nonuniform Traffic in a Packet Switching System with Small Propagation Delay
A new model of nonuniform traffic is introduced for a single-hop packet-switching system. This traffic model allows arbitrary traffic streams subject only to a constraint on the nu...
Timothy Weller, Bruce Hajek
IJWIS
2007
111views more  IJWIS 2007»
13 years 7 months ago
Monitoring the "health" status of open source web-engineering projects
—In response to the increasing number of open source software (OSS) project initiatives and the increasing demand of OSS products as alternative solutions by industries, it is im...
Dindin Wahyudin, Khabib Mustofa, Alexander Schatte...
PERCOM
2007
ACM
14 years 7 months ago
Middleware for Secure Home Access and Control
User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combinati...
Andrés Marín López, Wolfgang ...