Sciweavers

3259 search results - page 562 / 652
» Modeling Autonomous-System Relationships
Sort
View
JDCTA
2008
83views more  JDCTA 2008»
13 years 10 months ago
Translation from GDMO/ASN.1 to tML/Schema
For interoperation of heterogeneous management systems and integration of existing legacy applications in telecommunication network management systems, a translation from GDMO/ASN...
Wenli Dong
ISI
2006
Springer
13 years 10 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
JODS
2008
123views Data Mining» more  JODS 2008»
13 years 10 months ago
The Harmony Integration Workbench
A key aspect of any data integration endeavor is determining the relationships between the source schemata and the target schema. This schema integration task must be tackled regar...
Peter Mork, Len Seligman, Arnon Rosenthal, Joel Ko...
JPDC
2008
122views more  JPDC 2008»
13 years 10 months ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...
JCO
2006
67views more  JCO 2006»
13 years 10 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong