Sciweavers

762 search results - page 133 / 153
» Modeling and Simulating Information Security Management
Sort
View
ICDIM
2007
IEEE
13 years 9 months ago
Predicting durability in DHTs using Markov chains
We consider the problem of data durability in lowbandwidth large-scale distributed storage systems. Given the limited bandwidth between replicas, these systems suffer from long re...
Fabio Picconi, Bruno Baynat, Pierre Sens
WSC
2004
13 years 9 months ago
Enabling a Transforming Army at War: Analysis to Improve Logistics Network Efficiency and Effectiveness
This paper introduces and summarizes a comprehensive systems approach guiding an ongoing project addressing these significant challenges confronting logistics transformation. Curr...
Greg H. Parlier
IJNM
2000
91views more  IJNM 2000»
13 years 7 months ago
Coding-based schemes for fault identification in communication networks
The complexity of communication networks and the amount of information transferred in these networks have made the management of such networks increasingly difficult. Since faults ...
Chi-Chun Lo, Shing Hong Chen, Bon-Yeh Lin
MIR
2004
ACM
101views Multimedia» more  MIR 2004»
14 years 1 months ago
Leveraging face recognition technology to find and organize photos
With digital still cameras, users can easily collect thousands of photos. We have created a photo management application with the goal of making photo organization and browsing si...
Andreas Girgensohn, John Adcock, Lynn Wilcox
MSWIM
2005
ACM
14 years 1 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...