Sciweavers

208 search results - page 4 / 42
» Experience with Engineering a Network Forensics System
Sort
View
EUROSYS
2011
ACM
12 years 10 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
INFOCOM
2008
IEEE
14 years 1 months ago
Snoogle: A Search Engine for the Physical World
—Hardware advances will allow us to embed small devices into everyday objects such as toasters and coffee mugs, thus naturally form a wireless object network that connects the ob...
Haodong Wang, Chiu Chiang Tan, Qun Li
JDCTA
2010
155views more  JDCTA 2010»
13 years 2 months ago
Multi-factor predication of diesel engine by using artificial neural networks
The paper presents an algorithm which combining a neural network observer, it give more flexible and accurate control on the engine operation. In recent year, several researchers ...
Wenyong Xiao
SIGSOFT
2008
ACM
14 years 8 months ago
Experimenting with exception propagation mechanisms in service-oriented architecture
Exception handling is one of the popular means used for improving dependability and supporting recovery in the ServiceOriented Architecture (SOA). This practical experience paper ...
Anatoliy Gorbenko, Alexander Romanovsky, Vyachesla...
INFOCOM
2010
IEEE
13 years 5 months ago
Layered Internet Video Engineering (LIVE): Network-Assisted Bandwidth Sharing and Transient Loss Protection for Scalable Video S
—This paper presents a novel scheme, Layered Internet Video Engineering (LIVE), in which network nodes feed back virtual congestion levels to video senders to assist both media-a...
Xiaoqing Zhu, Rong Pan, Nandita Dukkipati, Vijay S...