Sciweavers

1092 search results - page 102 / 219
» Located Operators
Sort
View
DSN
2007
IEEE
14 years 4 months ago
Enhancing DNS Resilience against Denial of Service Attacks
The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past few years, distributed denial of service (DDoS) atta...
Vasileios Pappas, Daniel Massey, Lixia Zhang
WSC
1997
13 years 11 months ago
The Use of Simulation in Activity-Based Costing for Flexible Manufacturing Systems
A framework to design simulation models is described in order to perform activity-based costing for flexible manufacturing systems before actual manufacturing activities. For illu...
Soemon Takakuwa
IC
2010
13 years 8 months ago
Cloud Computing - The Next Revolution in Information Technology
: Computing is being transformed to a model consisting of services that are commoditised and delivered in a manner similar to utilities such as water, electricity, gas, and telepho...
Rajkumar Buyya
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
12 years 15 days ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
ICRA
2002
IEEE
75views Robotics» more  ICRA 2002»
14 years 3 months ago
First Experiment in Sun-Synchronous Exploration
Sun-synchronous exploration is accomplished by reasoning about sunlight: where the Sun is in the sky, where and when shadows will fall, and how much power can be obtained through ...
David Wettergreen, M. Bernardine Dias, Benjamin Sh...