Sciweavers

4922 search results - page 765 / 985
» Internet time out
Sort
View
ICST
2009
IEEE
15 years 11 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
UIC
2009
Springer
15 years 11 months ago
Mining and Visualizing Mobile Social Network Based on Bayesian Probabilistic Model
Social networking has provided powerful new ways to find people, organize groups, and share information. Recently, the potential functionalities of the ubiquitous infrastructure le...
Jun-Ki Min, Su-Hyung Jang, Sung-Bae Cho
ICN
2009
Springer
15 years 11 months ago
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks
Abstract— Current computing systems employ different mechanisms to deal with overload conditions. Of those widely deployed are content adaptation mechanisms whereby the quality l...
Mina Guirguis, Joshua Tharp, Azer Bestavros, Ibrah...
PCM
2009
Springer
97views Multimedia» more  PCM 2009»
15 years 11 months ago
Evaluating a Multimedia-Based Tele-Ophthalmology System
In a conventional eye department of hospital, an optometrist samples the eyes of a patient with medical instruments (e.g. camera, ophthalmoscope), and then delivers the medical rec...
Yongdong Wu, Haixia Yao, Zhigang Zhao
DEBS
2009
ACM
15 years 11 months ago
Distributed complex event processing with query rewriting
The nature of data in enterprises and on the Internet is changing. Data used to be stored in a database first and queried later. Today timely processing of new data, represented ...
Nicholas Poul Schultz-Møller, Matteo Miglia...