Sciweavers

268 search results - page 37 / 54
» scopes 2007
Sort
View
SECURWARE
2007
IEEE
14 years 1 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
WETICE
2007
IEEE
14 years 1 months ago
Coordinating Knowledge in Pervasive Environments
A new application of tuple-space-based coordination systems is in knowledge communication and representation. This knowledge is being published on the Web (the so-called “Semant...
Lyndon J. B. Nixon, Robert Tolksdorf, Alan Wood, R...
ATAL
2007
Springer
14 years 1 months ago
ARTS: agent-oriented robust transactional system
This paper presents the ARTS (Agent-oriented Robust Transactional System) model, which applies transaction concepts to provide agent developers with high-level support for agent s...
Mingzhong Wang, Amy Unruh, Kotagiri Ramamohanarao
BPM
2007
Springer
130views Business» more  BPM 2007»
14 years 1 months ago
Process Mining Based on Clustering: A Quest for Precision
Process mining techniques attempt to extract non-trivial and useful information from event logs recorded by information systems. For example, there are many process mining techniqu...
Ana Karla Alves de Medeiros, Antonella Guzzo, Gian...
ESOP
2007
Springer
14 years 1 months ago
CC-Pi: A Constraint-Based Language for Specifying Service Level Agreements
Abstract. Service Level Agreements are a key issue in Service Oriented Computing. SLA contracts specify client requirements and service guarantees, with emphasis on Quality of Serv...
Maria Grazia Buscemi, Ugo Montanari