Sciweavers

43 search results - page 8 / 9
» Load-balanced agent activation for value-added network servi...
Sort
View
ICSE
1999
IEEE-ACM
14 years 2 months ago
A Cooperative Approach to Support Software Deployment Using the Software Dock
Software deployment is an evolving collection of interrelated processes such as release, install, adapt, reconfigure, update, activate, deactivate, remove, and retire. The connect...
Richard S. Hall, Dennis Heimbigner, Alexander L. W...
AMT
2009
Springer
263views Multimedia» more  AMT 2009»
14 years 4 months ago
A Dynamic Trust Network for Autonomy-Oriented Partner Finding
The problem of partner finding is to identify which entities (agents) can provide requested services from a group of entities. It can be found in open and distributed environment...
Hongjun Qiu, Jiming Liu, Ning Zhong
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
13 years 11 months ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
INFOCOM
2007
IEEE
14 years 4 months ago
Detection and Localization of Network Black Holes
— Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fa...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
CONEXT
2009
ACM
13 years 11 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...