Sciweavers

1737 search results - page 247 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
AOSD
2005
ACM
15 years 8 months ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...
123
Voted
INFOCOM
2005
IEEE
15 years 8 months ago
Spatial energy balancing in large-scale wireless multihop networks
— In this paper we investigate the use of proactive multipath routing to achieve energy efficient operation of ad hoc wireless networks. The focus is on optimizing trade-offs be...
Seung Jun Baek, Gustavo de Veciana
114
Voted
WSC
1997
15 years 4 months ago
Forecasting Investment Opportunities Through Dynamic Simulation
Outcomes of this modeling research are the ability to facilitate comparisons of investment alternatives or strategies; regarding primary targets, possible annual revenues, promoti...
Stephen R. Parker
121
Voted
DCOSS
2007
Springer
15 years 8 months ago
Dwarf: Delay-aWAre Robust Forwarding for Energy-Constrained Wireless Sensor Networks
With the field of wireless sensor networks rapidly maturing, the focus shifts from “easy” deployments, like remote monitoring, to more difficult domains where applications imp...
Mario Strasser, Andreas Meier, Koen Langendoen, Ph...
116
Voted
IEEEVAST
2010
14 years 9 months ago
NetClinic: Interactive visualization to enhance automated fault diagnosis in enterprise networks
Diagnosing faults in an operational computer network is a frustrating, time-consuming exercise. Despite advances, automatic diagnostic tools are far from perfect: they occasionall...
Zhicheng Liu, Bongshin Lee, Srikanth Kandula, Ratu...