Sciweavers

1072 search results - page 163 / 215
» Service Level Management in Dynamic Value Networks
Sort
View
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 5 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
ICC
2007
IEEE
303views Communications» more  ICC 2007»
14 years 2 months ago
Diversity and Multiplexing in Cooperative Wireless Cellular Networks
Abstract— In wireless cellular systems, capacity can be increased if both in-cell and out-of-cell cochannel interference (CCI) is properly handled. Moreover, spatial multiplexing...
Diego Piazza, Guido Tartara
EWSN
2009
Springer
14 years 8 months ago
A Better Choice for Sensor Sleeping
Sensor sleeping is a widely-used and cost-effective technique to save energy in wireless sensor networks. Protocols at different stack levels can, either individually or simultaneo...
Ou Yang, Wendi Rabiner Heinzelman
IPPS
2008
IEEE
14 years 2 months ago
CoSL: A coordinated statistical learning approach to measuring the capacity of multi-tier websites
Website capacity determination is crucial to measurement-based access control, because it determines when to turn away excessive client requests to guarantee consistent service qu...
Jia Rao, Cheng-Zhong Xu
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
14 years 2 months ago
Systems Design, Process Performance and Economic Outcomes
IT value remains a serious concern of management today, especially how it should be measured and how it is created. Although we have made significant progress at the firm and aggre...
Prabu Davamanirajan, Robert J. Kauffman, Charles H...