Sciweavers

347 search results - page 39 / 70
» Development of Threat Evaluation Tool for Distributed Networ...
Sort
View
CAISE
2004
Springer
14 years 23 days ago
Network-based Business Process Management: a Discussion on Embedding Business Logic in Communications Networks
Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into reusable process modules. These process modu...
Louis-François Pau, Peter H. M. Vervest
USM
2000
13 years 11 months ago
Integrating Trading and Load Balancing for Efficient Management of Services in Distributed Systems
Due to the requirements of open service markets, the structure of networks and application systems is changing. To handle the evolving complex distributed systems, new concepts for...
Dirk Thißen, Helmut Neukirchen
HPDC
2002
IEEE
14 years 10 days ago
Decoupling Computation and Data Scheduling in Distributed Data-Intensive Applications
In high energy physics, bioinformatics, and other disciplines, we encounter applications involving numerous, loosely coupled jobs that both access and generate large data sets. So...
Kavitha Ranganathan, Ian T. Foster
TROB
2002
140views more  TROB 2002»
13 years 7 months ago
Hormone-inspired adaptive communication and distributed control for CONRO self-reconfigurable robots
This paper presents a biologically inspired approach to two basic problems in modular self-reconfigurable robots: adaptive communication in self-reconfigurable and dynamic networks...
Wei-Min Shen, Behnam Salemi, Peter M. Will
INFOCOM
2009
IEEE
14 years 2 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...