Sciweavers

1995 search results - page 135 / 399
» From Data Flow Networks to Process Algebras
Sort
View
144
Voted
MSR
2010
ACM
15 years 9 months ago
Validity of network analyses in Open Source Projects
—Social network methods are frequently used to analyze networks derived from Open Source Project communication and collaboration data. Such studies typically discover patterns in...
Roozbeh Nia, Christian Bird, Premkumar T. Devanbu,...
149
Voted
INFOCOM
1998
IEEE
15 years 9 months ago
MSOCKS: An Architecture for Transport Layer Mobility
Mobile nodes of the future will be equiped with multiple network interfaces to take advantage of overlay networks, yet no current mobility systems provide full support for the sim...
David A. Maltz, Pravin Bhagwat
139
Voted
IJCNN
2006
IEEE
15 years 10 months ago
Prototype based outlier detection
— Outliers refer to “minority” data that are different from most other data. They usually disturb data mining process. But, sometimes they provide valuable information. Thus,...
Seungtaek Kim, Sungzoon Cho
ACSAC
1998
IEEE
15 years 9 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
159
Voted
TITB
2010
128views Education» more  TITB 2010»
14 years 11 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...