Most existing criteria [3], [5], [8] for sizing router buffers rely on explicit formulation of the relationship between buffer size and characteristics of Internet traffic. However...
Despite the flurry of anomaly-detection papers in recent years, effective ways to validate and compare proposed solutions have remained elusive. We argue that evaluating anomaly d...
This paper presents ongoing research and current results on the development of flexible access control infrastructures for complex resource provisioning in Grid-based collaborativ...
Yuri Demchenko, Leon Gommans, Cees de Laat, Arie T...
Abstract. Issues related to 3d turtle’s navigation and geometrical figures’ manipulation in the simulated 3d space of a newly developed computational environment, MaLT, are re...
The workshop on Information Access to Cultural Heritage (IACH 2008) was held during the ECDL conference in Aarhus on the 18th September 2008. The workshop provided a venue to brin...
Martha Larson, Kate Fernie, Johan Oomen, Juan Migu...