Sciweavers

347 search results - page 15 / 70
» Development of Threat Evaluation Tool for Distributed Networ...
Sort
View
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 27 days ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
TRIDENTCOM
2010
IEEE
13 years 5 months ago
Managing Distributed Applications Using Gush
Deploying and controlling experiments running on a distributed set of resources is a challenging task. Software developers often spend a significant amount of time dealing with the...
Jeannie Albrecht, Danny Yuxing Huang
IFIP
2007
Springer
14 years 1 months ago
In-Time Role-Specific Notification as Formal Means to Balance Agile Practices in Global Software Development Settings
In global software development (GSD) projects, distributed teams collaborate to deliver high-quality software. Project managers need to control these development projects, which in...
Dindin Wahyudin, Matthias Heindl, Benedikt Eckhard...
ICSE
2010
IEEE-ACM
13 years 9 months ago
Supporting developers with natural language queries
The feature list of modern IDEs is steadily growing and mastering these tools becomes more and more demanding, especially for novice programmers. Despite their remarkable capabili...
Michael Würsch, Giacomo Ghezzi, Gerald Reif, ...
TMA
2010
Springer
487views Management» more  TMA 2010»
14 years 2 months ago
End-to-End Available Bandwidth Estimation Tools, An Experimental Comparison
Abstract. The available bandwidth of a network path impacts the performance of many applications, such as VoIP calls, video streaming and P2P content distribution systems. Several ...
Emanuele Goldoni, Marco Schivi