Sciweavers

126 search results - page 9 / 26
» Centrality in Policy Network Drawings
Sort
View
CONEXT
2009
ACM
13 years 8 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...
SASN
2006
ACM
14 years 1 months ago
Inverting sensor networks and actuating the environment for spatio-temporal access control
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is...
Shu Chen, Yu Zhang, Wade Trappe
EEE
2004
IEEE
13 years 11 months ago
Secure Online Examination Architecture Based on Distributed Firewall
Online (Web-based) examination is an effective solution for mass education evaluation. However, due to the incomplete of network security, students can communicate with each other...
Chi-Chien Pan, Kai-Hsiang Yang, Tzao-Lin Lee
LISA
1994
13 years 8 months ago
Towards a High-Level Machine Configuration System
This paper presents a machine configuration system which stores all configuration parameters in a central ``database''. The system is dynamic in the sense that machines ...
Paul Anderson
JITECH
2010
106views more  JITECH 2010»
13 years 6 months ago
Patterns and structures of intra-organizational learning networks within a knowledge-intensive organization
This paper employs the network perspective to study patterns and structures of intraorganizational learning networks. The theoretical background draws from cognitive theories, the...
Miha Skerlavaj, Vlado Dimovski, Kevin C. Desouza