Sciweavers

1572 search results - page 245 / 315
» Modeling IEEE 802.11 DCF System Dynamics
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
14 years 1 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
14 years 2 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...
PDP
2010
IEEE
14 years 4 months ago
SLA-driven Elastic Cloud Hosting Provider
—It is clear that Cloud computing is and will be a sea change for the Information Technology by changing the way in which both software and hardware are designed and purchased. I...
Josep Oriol Fito, Iñigo Goiri, Jordi Guitar...
ICPPW
2009
IEEE
14 years 3 months ago
Autonomic SLA Management in Federated Computing Environments
—Federated computing environments offer requestors the ability to dynamically invoke services offered by collaborating providers in the virtual service network. Without an effici...
Pawel Rubach, Michael W. Sobolewski
ICC
2007
IEEE
193views Communications» more  ICC 2007»
14 years 3 months ago
Cost-Effective MAP Selection in HMIPv6 Networks
— In Hierarchical Mobile IPv6(HMIPv6) networks, the system performance is critically affected by the selection of Mobile Anchor Points(MAPs) and its load status. Thus, in this pa...
Wonsik Chung, SuKyoung Lee