Sciweavers

1141 search results - page 189 / 229
» Analyzing Electroencephalograms Using Cloud Computing Techni...
Sort
View
144
Voted
MSWIM
2005
ACM
15 years 9 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
SOFTVIS
2005
ACM
15 years 9 months ago
Visualizing multiple evolution metrics
Observing the evolution of very large software systems is difficult because of the sheer amount of information that needs to be analyzed and because the changes performed in the s...
Martin Pinzger, Harald Gall, Michael Fischer, Mich...
GCC
2004
Springer
15 years 9 months ago
Distributed Object Group Framework with Dynamic Reconfigurability of Distributed Services
Abstract. In this paper, we constructed the Distributed Object Group Framework(DOGF) which is a reconfigurable architecture supporting dynamically adaptation of distributed service...
Chang-Sun Shin, Young-Jee Chung, Su-Chong Joo
CCS
2003
ACM
15 years 9 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
HIPC
2003
Springer
15 years 9 months ago
Double-Loop Feedback-Based Scheduling Approach for Distributed Real-Time Systems
The use of feedback control techniques has been gaining importance in real-time scheduling as a means to provide predictable performance in the face of uncertain workload. In this ...
Suzhen Lin, G. Manimaran