Sciweavers

6199 search results - page 140 / 1240
» Monitoring the
Sort
View
CLEIEJ
1998
134views more  CLEIEJ 1998»
15 years 4 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You
CONCURRENCY
1998
115views more  CONCURRENCY 1998»
15 years 4 months ago
Falcon: On-line monitoring for steering parallel programs
Abstract Advances in high performance computing, communications, and user interfaces enable developers to construct increasingly interactive high performance applications. The Falc...
Weiming Gu, Greg Eisenhauer, Karsten Schwan, Jeffr...
JUCS
2010
141views more  JUCS 2010»
15 years 2 months ago
How is e-Government Progressing? A Data Driven Approach to E-government Monitoring
: As ICT provide a lot of possibilities, high expectancies exist towards the electronic public service provision. All governments are increasingly establishing their e-strategies. ...
Jeroen Stragier, Pieter Verdegem, Gino Verleye
PERCOM
2010
ACM
15 years 2 months ago
Connectivity monitoring in wireless sensor networks
Connectivity monitoring is useful in practical deployment of wireless sensor network. In order to understand the behavior and performance bottleneck, knowledge of the network conn...
Mingze Zhang, Mun Choon Chan, Akkihebbal L. Ananda
PROCEDIA
2010
104views more  PROCEDIA 2010»
15 years 2 months ago
Composable cost estimation and monitoring for computational applications in cloud computing environments
With the offer from cloud computing providers, scientists have the opportunity to utilize pay-as-you-go resources together with their own and shared resources. However, scientist...
Hong Linh Truong, Schahram Dustdar