Sciweavers

2747 search results - page 269 / 550
» Network externalities in software systems
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
NAR
2000
127views more  NAR 2000»
13 years 10 months ago
The EMBL Nucleotide Sequence Database
The European Molecular Biology Laboratory (EMBL) Nucleotide Sequence Database (http://www.ebi.ac. uk/embl/index.html ) is maintained at the European Bioinformatics Institute (EBI)...
Wendy Baker, Alexandra van den Broek, Evelyn Camon...
PERCOM
2004
ACM
14 years 10 months ago
Programming Pervasive and Mobile Computing Applications with the TOTA Middleware
Pervasive computing calls for suitable middleware and programming models to deal with large software systems dived in dynamic mobile network environments. Here we present the prog...
Marco Mamei, Franco Zambonelli
WIMOB
2008
IEEE
14 years 5 months ago
A Protocol for Pervasive Distributed Computing Reliability
Abstract—The adoption of new hardware and software architectures will make future generations of pervasive devices more flexible and extensible. Networks of computational nodes ...
Alberto Ferrante, Roberto Pompei, Anastasia Stulov...
ICNS
2006
IEEE
14 years 4 months ago
Service Level Agreement Management with Adaptive Coordination
Service Level Agreement Management in the telecommunications domain consists of a set of mechanisms for provisioning and monitoring services according to requirements given by eit...
Dominic A. P. Greenwood, Giosuè Vitaglione,...