Sciweavers

545 search results - page 82 / 109
» Modeling the tele-immersive systems using stochastic activit...
Sort
View
WWW
2010
ACM
14 years 2 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
ACSAC
2008
IEEE
14 years 2 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
ACMICEC
2008
ACM
276views ECommerce» more  ACMICEC 2008»
13 years 9 months ago
A Bayesian network for IT governance performance prediction
The goal of IT governance is not only to achieve internal efficiency in an IT organization, but also to support IT's role as a business enabler. The latter is here denoted IT...
Mårten Simonsson, Robert Lagerström, Po...
EXPERT
2011
131views more  EXPERT 2011»
12 years 11 months ago
Grid Monitoring and Market Risk Management
—With the rapid development of the electricity market, both grid and market operations need to be carefully coordinated and monitored in real time. This paper focuses on system m...
Yufan Guan, Mladen Kezunovic
IMC
2006
ACM
14 years 1 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie