Sciweavers

4330 search results - page 716 / 866
» Analyzing security architectures
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 4 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
COMCOM
2006
154views more  COMCOM 2006»
15 years 4 months ago
Wireless sensor networks for personal health monitoring: Issues and an implementation
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Aleksandar Milenkovic, Chris Otto, Emil Jovanov
CONCURRENCY
2006
111views more  CONCURRENCY 2006»
15 years 4 months ago
ScyFlow: an environment for the visual specification and execution of scientific workflows
With the advent of grid technologies, scientists and engineers are building more and more complex applications to utilize distributed grid resources. The core grid services provid...
Karen M. McCann, Maurice Yarrow, Adrian De Vivo, P...
DI
2006
67views more  DI 2006»
15 years 4 months ago
A portable network forensic evidence collector
A small portable network forensic evidence collection device is presented which is built using inexpensive embedded hardware and open source software. The device oers several mode...
Bruce J. Nikkel
DKE
2006
79views more  DKE 2006»
15 years 4 months ago
The view-based approach to dynamic inter-organizational workflow cooperation
This paper presents a novel approach to inter-organizational workflow cooperation. Our goal is to provide support for organizations which are involved in a shared but not pre-mode...
Issam Chebbi, Schahram Dustdar, Samir Tata