Sciweavers

55 search results - page 6 / 11
» Experiences in Deploying Services within the Axis Container
Sort
View
WWW
2006
ACM
14 years 8 months ago
Predictive modeling of first-click behavior in web-search
Search engine results are usually presented in some form of text summary (e.g., document title, some snippets of the page's content, a URL, etc). Based on the information con...
Maeve O'Brien, Mark T. Keane, Barry Smyth
INFOCOM
2009
IEEE
14 years 2 months ago
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses
Abstract—The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of I...
Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong ...
GLOBECOM
2008
IEEE
13 years 8 months ago
Robust Edge Detection in Wireless Sensor Networks
Abstract— The ability to geometrically represent sensed phenomena within a wireless sensor network can provide a more concise view than enumeration of all nodes identifying a phe...
Christopher J. Mallery, Muralidhar Medidi
EUROSYS
2010
ACM
14 years 4 months ago
Barricade: Defending Systems Against Operator Mistakes
In this paper, we propose a management framework for protecting large computer systems against operator mistakes. By detecting and confining mistakes to isolated portions of the ...
Fabio Oliveira, Andrew Tjang, Ricardo Bianchini, R...
CRIWG
2001
13 years 9 months ago
Yaka: Document Notification and Delivery Across Heterogeneous Document Repositories
Nowadays people have to deal with an increasing amount of information contained in electronic documents available from numerous heterogeneous, widely distributed sources. Keeping ...
Damián Arregui, François Pacull, Jut...