Sciweavers

1314 search results - page 59 / 263
» The Impact of Active Networks on Established Network Operato...
Sort
View
ICDE
2008
IEEE
122views Database» more  ICDE 2008»
14 years 9 months ago
On Signatures for Communication Graphs
Abstract-- Communications between individuals can be represented by (weighted, multi-) graphs. Many applications operate on communication graphs associated with telephone calls, em...
Graham Cormode, Flip Korn, S. Muthukrishnan, Yihua...
DSN
2009
IEEE
14 years 2 months ago
Fast memory state synchronization for virtualization-based fault tolerance
Virtualization provides the possibility of whole machine migration and thus enables a new form of fault tolerance that is completely transparent to applications and operating syst...
Maohua Lu, Tzi-cker Chiueh
WECWIS
1999
IEEE
164views ECommerce» more  WECWIS 1999»
14 years 4 days ago
Effect of Bargaining in Electronic Commerce
Internet business has grown at an unprecedented rate in the past several years. Recent research has found that the functions provided by a store have a significant impact on custo...
Ting-Peng Liang, Her-Sen Doong
CORR
2010
Springer
162views Education» more  CORR 2010»
13 years 6 months ago
Networked Computing in Wireless Sensor Networks for Structural Health Monitoring
Abstract—This paper studies the problem of distributed computation over a network of wireless sensors. While this problem applies to many emerging applications, to keep our discu...
Apoorva Jindal, Mingyan Liu
ACSAC
2000
IEEE
14 years 8 days ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford