Sciweavers

1616 search results - page 251 / 324
» networks 2002
Sort
View
DSN
2003
IEEE
14 years 3 months ago
Human-Machine Diversity in the Use of Computerised Advisory Systems: A Case Study
Computer-based advisory systems form with their users composite, human-machine systems. Redundancy and diversity between the human and the machine are often important for the depe...
Lorenzo Strigini, Andrey Povyakalo, Eugenio Alberd...
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
14 years 3 months ago
XML Based Robust Client-Server Communication for a Distributed Telecommunication Management System
Our Distributed Telecommunication Management System (DTMS) uses an object-oriented model to describe the networked Voice Communication System (VCS) to be managed. In order to allo...
Karl M. Göschka, Helmut Reis, Robert Smeikal
ACSAC
2002
IEEE
14 years 3 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
CCGRID
2002
IEEE
14 years 3 months ago
Sensitivity of Cluster File System Access to I/O Server Selection
This paper describes measurement tests of Parallel Virtual File System (PVFS) and Network File System (NFS) over a commodity Linux cluster connected with Myrinet. PVFS stores a ...
Amy W. Apon, P. D. Wolinski, G. M. Amerson
CCGRID
2002
IEEE
14 years 3 months ago
NEVRLATE: Scalable Resource Discovery
A scalable and expressive peer-to-peer (P2P) networking and computing framework requires efficient resource discovery services. Here we propose NEVRLATE, for Network-Efficient V...
Ajay Chander, Steven Dawson, Patrick Lincoln, Davi...