Sciweavers

631 search results - page 98 / 127
» Distributed Cross-Domain Change Management
Sort
View
CONEXT
2006
ACM
14 years 1 months ago
Reconciling zero-conf with efficiency in enterprises
A conventional enterprise or campus network comprises Ethernet-based IP subnets interconnected by routers. Although each subnet runs with minimal (or zero) configuration by virtue...
Chang Kim, Jennifer Rexford
IWCMC
2006
ACM
14 years 1 months ago
Tracers placement for IP traceback against DDoS attacks
This paper explores the tracers deployment problem for IP traceback methods how many and where the tracers should be deployed in the network to be effective for locating the attac...
Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-M...
IWIA
2005
IEEE
14 years 1 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
WETICE
2005
IEEE
14 years 1 months ago
Challenges and Solutions for Model Driven Web Service Composition
System theory propagates the use of models which e level of abstraction to cope with complexity, evolving out of variety and connectivity. Different modeling techniques have been ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...
EDOC
2003
IEEE
14 years 1 months ago
An Agent-based Architecture for Analyzing Business Processes of Real-Time Enterprises
As the desire for business intelligence capabilities for e-business processes expands, existing workflow management systems and decision support systems are not able to provide co...
Jun-Jang Jeng, Josef Schiefer, Henry Chang