Sciweavers

24 search results - page 2 / 5
» An Investigation of Forecasting Critical Spare Parts Require...
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
MM
1993
ACM
107views Multimedia» more  MM 1993»
13 years 11 months ago
What Video Can and Can't Do for Collaboration: A Case Study
As multimedia becomes an integral part of collaborative systems, we must understand how to design such systems to support users’ rich set of existing interaction skills, rather ...
Ellen Isaacs, John C. Tang
SAC
2011
ACM
12 years 10 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
AINA
2004
IEEE
13 years 11 months ago
A Vision on Semantic Retrieval in P2P Network
P2P systems are a revival paradigm for information sharing among distributed nodes in the network. Currently, many research projects or practical applications have emerged from th...
Hao Ding, Ingeborg Sølvberg, Yun Lin
CARTOGRAPHICA
2010
111views more  CARTOGRAPHICA 2010»
13 years 5 months ago
Essential, Illustrative, or ... Just Propaganda? Rethinking John Snow's Broad Street Map
For more than a century John Snow's iconic map of an 1854 cholera outbreak in the Broad Street area of Soho, London, has been the very definition of how to discover the sourc...
Tom Koch, Ken Denike