Sciweavers

2045 search results - page 306 / 409
» The open network laboratory
Sort
View
ISSE
2006
13 years 10 months ago
Modeling security as a dependability attribute: a refinement-based approach
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
JNCA
2007
126views more  JNCA 2007»
13 years 10 months ago
Usage derived recommendations for a video digital library
We describe a minimalist methodology to develop usage-based recommender systems for multimedia digital libraries. A prototype recommender system based on this strategy was impleme...
Johan Bollen, Michael L. Nelson, Gary Geisler, Raq...
JUCS
2007
108views more  JUCS 2007»
13 years 10 months ago
Integrating Module Checking and Deduction in a Formal Proof for the Perlman Spanning Tree Protocol (STP)
: In the IEEE 802.1D standard for the Media Access Control layer (MAC layer) bridges, there is an STP (Spanning Tree Protocol) definition, based on the algorithm that was proposed...
Hossein Hojjat, Hootan Nakhost, Marjan Sirjani
PVLDB
2008
110views more  PVLDB 2008»
13 years 10 months ago
DObjects: enabling distributed data services for metacomputing platforms
Many applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. The key co...
Pawel Jurczyk, Li Xiong
SMC
2010
IEEE
159views Control Systems» more  SMC 2010»
13 years 9 months ago
Mobile interaction with smart environments through linked data
This paper presents the design and architecture of an integrated environment that provides location independent and mobile access to Intelligent Domotic Environments. The envision...
Faisal Razzak, Dario Bonino, Fulvio Corno