Sciweavers

3515 search results - page 613 / 703
» Resource usage analysis
Sort
View
131
Voted
ANSS
2003
IEEE
15 years 8 months ago
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks
The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based DoS attacks. Our strategy employs three lin...
Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb...
HICSS
2003
IEEE
156views Biometrics» more  HICSS 2003»
15 years 8 months ago
Developing Video Services for Mobile Users
Video information, image processing and computer vision techniques are developing rapidly nowadays because of the availability of acquisition, processing and editing tools, which ...
Mohamed Ahmed, Roger Impey, Ahmed Karmouch
109
Voted
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
15 years 8 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
HICSS
2003
IEEE
131views Biometrics» more  HICSS 2003»
15 years 8 months ago
An ERP Maintenance Model
Enterprise resource planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Annual maintenance costs approximate 25% of initial ...
Celeste See Pui Ng, Guy G. Gable, Taizan Chan
INFOCOM
2003
IEEE
15 years 8 months ago
Physical Topology Discovery for Large Multi-Subnet Networks
— Knowledge of the up-to-date physical (i.e., layer-2) topology of an Ethernet network is crucial to a number of critical network management tasks, including reactive and proacti...
Yigal Bejerano, Yuri Breitbart, Minos N. Garofalak...