—With the proliferation of mobile devices in both smartphone and tablet form factors, it is intuitive and natural for users to socially interact with their collaborators or compe...
— To ensure the operability and reliability of large scale Enterprise Resource Planning Systems (ERP), a peak-load oriented hardware sizing is often used. Better utilization can ...
Martin Wimmer, Valentin Nicolescu, Daniel Gmach, M...
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
Many applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. The key co...
Abstract—This article describes a distributed classroom experiment carried out by five universities in the US and Europe at the beginning of 2007. This experiment was motivated ...
Andrei Hutanu, Ravi Paruchuri, Daniel Eiland, Milo...