Sciweavers

2940 search results - page 445 / 588
» Behavioral Constraints for Services
Sort
View
ICDE
2008
IEEE
118views Database» more  ICDE 2008»
14 years 3 months ago
OntoNet: Scalable knowledge-based networking
Recent years have seen a proliferation of work on the Semantic Web, an initiative to enable intelligent agents to reason about and utilize World Wide Web content and services. Con...
Joseph B. Kopena, Boon Thau Loo
IEEEARES
2008
IEEE
14 years 3 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
INFOCOM
2008
IEEE
14 years 3 months ago
Temporal Delay Tomography
Abstract—Multicast-based network tomography enables inference of average loss rates and delay distributions of internal network links from end-to-end measurements of multicast pr...
Vijay Arya, Nick G. Duffield, Darryl Veitch
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 3 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
WETICE
2008
IEEE
14 years 3 months ago
Information and Regulation in Decentralized Marketplaces for P2P-Grids
Large scale systems such as the Grid need scalable and efficient resource allocation mechanisms to fulfil the requirements of its participants and applications while the whole s...
Xavier León, Xavier Vilajosana, René...