Sciweavers

411 search results - page 16 / 83
» Technological Strategy of Using Global Positioning System: A...
Sort
View
IWIA
2005
IEEE
14 years 2 months ago
Forensic Analysis of File System Intrusions Using Improved Backtracking
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
Sriranjani Sitaraman, Subbarayan Venkatesan
WWW
2009
ACM
14 years 9 months ago
Combining global optimization with local selection for efficient QoS-aware service composition
The run-time binding of web services has been recently put forward in order to support rapid and dynamic web service compositions. With the growing number of alternative web servi...
Mohammad Alrifai, Thomas Risse
COMCOM
2002
86views more  COMCOM 2002»
13 years 8 months ago
The globe infrastructure directory service
To implement adaptive replication strategies for Web documents, we have developed a wide area resource management system. This system allows servers to be managed on a local and g...
Ihor Kuz, Maarten van Steen, Henk J. Sips
ISF
2011
13 years 3 months ago
A multi-region empirical study on the internet presence of global extremist organizations
Abstract Extremist organizations are heavily utilizing Internet technologies to increase their abilities to influence the world. Studying those global extremist organizations’ In...
Jialun Qin, Yilu Zhou, Hsinchun Chen
DAC
2002
ACM
14 years 9 months ago
Model composition for scheduling analysis in platform design
We present a compositional approach to analyze timing behavior of complex platforms with different scheduling strategies. The approach uses event interfacing in order to couple pr...
Kai Richter, Dirk Ziegenbein, Marek Jersak, Rolf E...