Sciweavers

1815 search results - page 339 / 363
» Cloud Computing: An Overview
Sort
View
VIZSEC
2005
Springer
14 years 3 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
WAOA
2005
Springer
177views Algorithms» more  WAOA 2005»
14 years 3 months ago
Approximation and Complexity of k-Splittable Flows
Given a graph with a source and a sink node, the NP–hard maximum k–splittable flow (MkSF) problem is to find a flow of maximum value with a flow decomposition using at most...
Ronald Koch, Martin Skutella, Ines Spenke
ECAI
2004
Springer
14 years 3 months ago
A Context-Based Model of Attention
d abstract)1 Niek Bergboer Eric Postma Jaap van den Herik Institute for Knowledge and Agent Technology, Universiteit Maastricht, P.O. Box 616, 6200 MD Maastricht It is well known t...
Niek Bergboer, Eric O. Postma, H. Jaap van den Her...
GI
2004
Springer
14 years 3 months ago
Contractual Relationships in Open Source Structures
: The article provides an overview of the legal relationships in Open Source Structures. It shows that – as within all software development and distribution models – different ...
Carsten Schulz
C5
2003
IEEE
14 years 3 months ago
Squeak Workshop Experiences in Kyoto
This poster presentation introduces our first Squeak workshops offered in the context of the ALAN-K (Advanced LeArning Network in Kyoto) project (Konomi and Karuno, 2003), which i...
Hiroki Karuno, Shin'ichi Konomi