Sciweavers

1195 search results - page 187 / 239
» Deployment Time Performance Optimization of Internet Service...
Sort
View
IEEEIAS
2009
IEEE
14 years 2 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
ICSOC
2007
Springer
14 years 2 months ago
Let It Flow: Building Mashups with Data Processing Pipelines
Mashups are a new kind of interactive Web application, built out of the composition of two or more existing Web service APIs and data sources. Whereas “pure” mashups are built ...
Biörn Biörnstad, Cesare Pautasso
ICIP
2007
IEEE
14 years 9 months ago
Lifetime-Distortion Trade-off in Image Sensor Networks
We examine the trade-off between lifetime and distortion in image sensor networks deployed for gathering visual information over a monitored region. Users navigate over the monito...
Chao Yu, Stanislava Soro, Gaurav Sharma, Wendi Rab...
GCC
2007
Springer
14 years 2 months ago
Adapting to Application Workflow in Processing Data Integration Queries
Data integration has evolved to provide efficient data management across distributed and heterogeneous data sources in grid environment. However, existing works in data integratio...
Yongwei Wu, Jia Liu, Gang Chen, Guangwen Yang, Bo ...
WCNC
2010
IEEE
13 years 11 months ago
A Lightweight Distributed Solution to Content Replication in Mobile Networks
Abstract—Performance and reliability of content access in mobile networks is conditioned jointly by the number and location of content replicas deployed at the network nodes. The...
C.-A. La, Pietro Michiardi, Claudio Casetti, Carla...