Sciweavers

1061 search results - page 68 / 213
» Experiences with Honeypot Systems: Development, Deployment, ...
Sort
View
ICDIM
2007
IEEE
14 years 2 months ago
Accessibility and scalability in collaborative eCommerce environments
The Much advancement has lately occurred in eCommerce systems’ interfaces. Product specifications listings combined with pictures is no longer considered the benchmark for eComm...
Michel Khoury, Shervin Shirmohammadi
ICMCS
2008
IEEE
158views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Video quality assessment and comparative evaluation of peer-to-peer video streaming systems
We design a test methodology to analyze in detail the video quality received at each peer in a peer-to-peer (P2P) video streaming system. The metrics that we employ at each peer i...
Aditya Mavlankar, Pierpaolo Baccichet, Bernd Girod...
DAGSTUHL
2009
13 years 8 months ago
Policy-Based Architectural Adaptation Management: Robotics Domain Case Studies
Robotics is a challenging domain that exhibits a clear need for self-adaptive capabilities, as self-adaptation offers the potential for robots to account for their unstable and unp...
John C. Georgas, Richard N. Taylor
EMSOFT
2006
Springer
13 years 11 months ago
Modeling a system controller for timing analysis
Upper bounds on worst-case execution times, which are commonly called WCET, are a prerequisite for validating the temporal correctness of tasks in a real-time system. Due to the e...
Stephan Thesing
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 2 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li