Sciweavers

1063 search results - page 89 / 213
» Infrastructure Leasing Problems
Sort
View
BCI
2009
IEEE
14 years 3 months ago
Database Oriented Grid Middlewares
—Efficient management of massive data sets is a key aspect in typical grid and e-science applications. To this end, the benefits of employing database technologies in such appl...
Efthymia Tsamoura, Anastasios Gounaris
PERCOM
2009
ACM
14 years 3 months ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...
WECWIS
2009
IEEE
168views ECommerce» more  WECWIS 2009»
14 years 3 months ago
SARI-SQL: Event Query Language for Event Analysis
Complex Event Processing (CEP) systems are capable of processing large amounts of events, utilizing them to monitor, steer and optimize business in real time. The lack of tracking...
Szabolcs Rozsnyai, Josef Schiefer, Heinz Roth
APNOMS
2009
Springer
14 years 3 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong
DSOM
2009
Springer
14 years 3 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...