Sciweavers

115 search results - page 3 / 23
» ANSWER: Network Monitoring Using Object-Oriented Rules
Sort
View
ECSCW
2007
13 years 6 months ago
The Awareness Network: To Whom Should I Display My Actions? And, Whose Actions Should I Monitor?
The concept of awareness has come to play a central role in CSCW research. The coordinative practices of displaying and monitoring have received attention and have led to different...
Cleidson R. B. de Souza, David F. Redmiles
DCOSS
2008
Springer
13 years 7 months ago
An Information Theoretic Framework for Field Monitoring Using Autonomously Mobile Sensors
We consider a mobile sensor network monitoring a spatio-temporal field. Given limited caches at the sensor nodes, the goal is to develop a distributed cache management algorithm to...
Hany Morcos, George Atia, Azer Bestavros, Ibrahim ...
TMC
2011
1105views more  TMC 2011»
13 years 11 days ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
IJISEC
2008
188views more  IJISEC 2008»
13 years 4 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
AINA
2003
IEEE
13 years 9 months ago
Formal Verification of Condition Data Flow Diagrams for Assurance of Correct Network Protocols
Condition Data Flow Diagrams (CDFDs) are a formalized notation resulting from the integration of Yourdon Data Flow Diagrams, Petri Nets, and pre-post notation. They are used in th...
Shaoying Liu