Sciweavers

129 search results - page 12 / 26
» Academic dishonesty and the Internet
Sort
View
IAW
2003
IEEE
14 years 3 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
SAC
2000
ACM
14 years 2 months ago
XML Dataspaces for Mobile Agent Coordination
This paper presents XMARS, a programmable coordination architecture for Internet applications based on mobile agents. In XMARS, agents coordinate – both with each other and with...
Giacomo Cabri, Letizia Leonardi, Franco Zambonelli
JTAER
2006
70views more  JTAER 2006»
13 years 9 months ago
Australian Franchisor websites: Moving towards network behaviour
Australia is one of the leading nations using the internet in both business-to-consumer (B2C) and business-tobusiness (B2B) settings (ABS 2004). However, little academic attention...
Sally Rao, Lorelle Frazer
DOLAP
2009
ACM
14 years 4 months ago
LMDQL: link-based and multidimensional query language
The current commercial and academic OLAP tools do not process XML data that make use of XLink. To develop OLAP systems for helping in the analysis of such data, this paper propose...
Paulo Caetano da Silva, Fábio Santos Souza,...
CIMCA
2008
IEEE
14 years 4 months ago
Analyzing Resource-Usage Impact on Component-Based Systems Performance and Reliability
An early prediction of resource utilization and its impact on system performance and reliability can reduce the overall system cost, by allowing early correction of detected probl...
Aida Causevic, Paul Pettersson, Cristina Cerschi S...