Sciweavers

25316 search results - page 4805 / 5064
» Computational sensor networks
Sort
View
NOSSDAV
2004
Springer
15 years 9 months ago
An adaptive multiple retransmission technique for continuous media streams
Retransmission can be used for loss recovery in continuous media applications but the number of retransmission attempts is bounded by the size of the playout buffer. For efficient...
Rishi Sinha, Christos Papadopoulos
POLICY
2004
Springer
15 years 9 months ago
A Policy Driven Approach to Email Services
The primary original design goal for email was to provide best-effort message delivery. Unfortunately, as the ever increasing uproar over SPAM demonstrates, the existing email inf...
Saket Kaushik, Paul Ammann, Duminda Wijesekera, Wi...
POLICY
2004
Springer
15 years 9 months ago
A Goal-based Approach to Policy Refinement
As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods for performing analysis and refinement of p...
Arosha K. Bandara, Emil Lupu, Jonathan D. Moffett,...
POLICY
2004
Springer
15 years 9 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
RAID
2004
Springer
15 years 9 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
« Prev « First page 4805 / 5064 Last » Next »