Sciweavers

34181 search results - page 53 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
14 years 1 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
IFIP
2003
Springer
14 years 27 days ago
Implementation of a Scalable Context-Aware Computing System
Abstract. Context-aware computing involves the automatic tailoring of information and services based on the current location of the user. In this paper, we describe our experience ...
Tamer Nadeem, Adel M. Youssef, Suman Banerjee, Mou...
KESAMSTA
2010
Springer
13 years 5 months ago
Engaging the Dynamics of Trust in Computational Trust and Reputation Systems
Computational Trust and Reputation (CTR) systems are essential in electronic commerce to encourage interactions and suppress deceptive behaviours. This paper focus on comparing two...
Agnieszka Danek, Joana Urbano, Ana Paula Rocha, Eu...

Lecture Notes
742views
15 years 5 months ago
Computer Systems Analysis
Comparing systems using measurement, simulation, and queueing models. Common mistakes and how to avoid them, selection of techniques and metrics, art of data presentation, summariz...
Raj Jain
ICAC
2009
IEEE
14 years 2 months ago
Ranking the importance of alerts for problem determination in large computer systems
The complexity of large computer systems has raised unprecedented challenges for system management. In practice, operators often collect large volume of monitoring data from system...
Guofei Jiang, Haifeng Chen, Kenji Yoshihira, Akhil...