Sciweavers

356 search results - page 57 / 72
» The human infrastructure of cyberinfrastructure
Sort
View
DIMVA
2010
13 years 9 months ago
Evaluating Bluetooth as a Medium for Botnet Command and Control
Abstract. Malware targeting mobile phones is being studied with increasing interest by the research community. While such attention has previously focused on viruses and worms, man...
Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Tr...
CASCON
2008
137views Education» more  CASCON 2008»
13 years 9 months ago
Automating SLA modeling
Service Level Agreements (SLAs) define the level of service that a service provider must deliver. An SLA is a contract between service provider and consumer, and includes appropri...
Tony Chau, Vinod Muthusamy, Hans-Arno Jacobsen, El...
ICWN
2008
13 years 9 months ago
Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Landslides are one of the environmental disasters that cause massive destruction of human life and infrastructure. Real time monitoring of a landslide prone areas are necessary to...
Ramesh Maneesha, P. Ushakumari
IADIS
2004
13 years 9 months ago
User Satisfaction and Attitudes Towards an Internet-Based Simulation
This paper presents an analysis of the degree to which attitudes towards an Internet-based simulation depend on how satisfied participants are with the software used. The theoreti...
Knut Ekker
IC
2003
13 years 9 months ago
Issues in Integration of Civil Engineering Services and Tools
—Civil Engineering is a discipline providing one of the most challenging environments for integration and interoperability. Great hopes are wired and wireless networking technolo...
Ziga Turk, Tomo Cerovsek, Raimar J. Scherer