Sciweavers

2376 search results - page 460 / 476
» CM - Configuration Change Management
Sort
View
IMC
2007
ACM
13 years 9 months ago
Understanding passive and active service discovery
Increasingly, network operators do not directly operate computers on their network, yet are responsible for assessing network vulnerabilities to ensure compliance with policies ab...
Genevieve Bartlett, John S. Heidemann, Christos Pa...
EDM
2010
248views Data Mining» more  EDM 2010»
13 years 9 months ago
Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments
It is argued that the analysis of the learner's generated log files during interactions with a learning environment is necessary to produce interpretative views of their activ...
Nabila Bousbia, Jean-Marc Labat, Amar Balla, Issam...
DAGSTUHL
2007
13 years 9 months ago
An XML Framework for Integrating Continuous Queries, Composite Event Detection, and Database Condition Monitoring for Multiple D
Abstract Current, data-driven applications have become more dynamic in nature, with the need to respond to events generated from distributed sources or to react to information extr...
Susan Darling Urban, Suzanne W. Dietrich, Yi Chen
NSDI
2010
13 years 9 months ago
Glasnost: Enabling End Users to Detect Traffic Differentiation
Holding residential ISPs to their contractual or legal obligations of "unlimited service" or "network neutrality" is hard because their traffic management poli...
Marcel Dischinger, Massimiliano Marcon, Saikat Guh...
EON
2008
13 years 9 months ago
Abductive Synthesis of the Mediator Scenario with jABC and GEM
We reuse here the framework, the setting, and the semantic modelling for the automated synthesis of the SWS Challenge Mediator presented in the companion paper [5], and show how to...
Christian Kubczak, Tiziana Margaria, Matthias Kais...