Sciweavers

1358 search results - page 143 / 272
» Mapping Accessibility Over Time
Sort
View
GI
2009
Springer
13 years 6 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
ASPLOS
2011
ACM
13 years 16 days ago
Pocket cloudlets
Cloud services accessed through mobile devices suffer from high network access latencies and are constrained by energy budgets dictated by the devices’ batteries. Radio and batt...
Emmanouil Koukoumidis, Dimitrios Lymberopoulos, Ka...
TMC
2008
180views more  TMC 2008»
13 years 8 months ago
OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks
Wireless networks and devices have rapidly been gaining popularity over their wired counterparts. This popularity, in turn, has been generating an explosive and ever-increasing dem...
Bechir Hamdaoui, Kang G. Shin
P2P
2007
IEEE
132views Communications» more  P2P 2007»
14 years 3 months ago
The Design and Evaluation of Techniques for Route Diversity in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough
ESA
2007
Springer
120views Algorithms» more  ESA 2007»
14 years 3 months ago
Evolutionary Equilibrium in Bayesian Routing Games: Specialization and Niche Formation
Abstract. In this paper we consider Nash Equilibria for the selfish routing model proposed in [12], where a set of n users with tasks of different size try to access m parallel l...
Petra Berenbrink, Oliver Schulte