Sciweavers

1266 search results - page 196 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
ICCSA
2005
Springer
14 years 2 months ago
Implementing Immersive Clustering with VR Juggler
Abstract. The last advances in commodity hardware have allowed users of immersive visualization to create high-performance systems using a set of interconnected computers. These sy...
Aron Bierbaum, Patrick Hartling, Pedro Morillo, Ca...
MMNS
2007
105views Multimedia» more  MMNS 2007»
13 years 10 months ago
Monitoring Flow Aggregates with Controllable Accuracy
In this paper, we show the feasibility of real-time flow monitoring with controllable accuracy in today’s IP networks. Our approach is based on Netflow and A-GAP. A-GAP is a prot...
Alberto Gonzalez Prieto, Rolf Stadler
UAI
1998
13 years 9 months ago
Context-specific approximation in probabilistic inference
There is evidence that the numbers in probabilistic inference don't really matter. This paper considers the idea that we can make a probabilistic model simpler by making fewe...
David Poole
EUROPAR
2008
Springer
13 years 10 months ago
Complex Queries for Moving Object Databases in DHT-Based Systems
Abstract. Distributed moving object database servers are a feasible solution to the scalability problem of centralized database systems. In this paper we propose a distributed inde...
Cecilia Hernández, M. Andrea Rodrígu...
ISIPTA
2003
IEEE
111views Mathematics» more  ISIPTA 2003»
14 years 1 months ago
The DecideIT Decision Tool
The nature of much information available to decision makers is vague and imprecise, be it information for human managers in organisations or for process agents in a distributed co...
Mats Danielson, Love Ekenberg, Jim Johansson, Aron...