Sciweavers

1266 search results - page 153 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
168
Voted
NAACL
2003
15 years 5 months ago
Automatic Extraction of Semantic Networks from Text using Leximancer
Leximancer is a software system for performing conceptual analysis of text data in a largely language independent manner. The system is modelled on Content Analysis and provides u...
Andrew E. Smith
CORR
2008
Springer
145views Education» more  CORR 2008»
15 years 4 months ago
Decentralized Overlay for Federation of Enterprise Clouds
This chapter describes Aneka-Federation, a decentralized and distributed system that combines enterprise Clouds, overlay networking, and structured peer-to-peer techniques to crea...
Rajiv Ranjan, Rajkumar Buyya
114
Voted
IPPS
2007
IEEE
15 years 10 months ago
Machine Bank: Own Your Virtual Personal Computer
In this paper, we report the design, implementation and experimental results of Machine Bank, a system engineered towards the popular shared-lab scenario, where users outnumber av...
Shuo Tang, Yu Chen, Zheng Zhang
TMA
2010
Springer
212views Management» more  TMA 2010»
15 years 11 months ago
EmPath: Tool to Emulate Packet Transfer Characteristics in IP Network
The paper describes the EmPath tool that was designed to emulate packet transfer characteristics as delays and losses in IP network. The main innovation of this tool is its ability...
Jaroslaw Sliwinski, Andrzej Beben, Piotr Krawiec
ICPPW
2002
IEEE
15 years 9 months ago
Robust Routing in Wireless Ad Hoc Networks
A wireless ad hoc network is a collection of mobile nodes with no fixed infrastructure. The absence of central authorization facility in dynamic and distributed environment requir...
Seungjoon Lee, Bohyung Han, Minho Shin