Sciweavers

DEXA
2007
Springer
89views Database» more  DEXA 2007»
13 years 11 months ago
Dependency Management for the Preservation of Digital Information
Abstract. The notion of dependency is ubiquitous. This paper approaches this notion from the perspective of digital information preservation. At first, an abstract notion of modul...
Yannis Tzitzikas
IDEAS
2007
IEEE
99views Database» more  IDEAS 2007»
13 years 11 months ago
Implementing Physical Hyperlinks for Mobile Applications Using RFID Tags
Hyperlinks are a well understood and widely used concept in many applications. Particularly the Web has promoted the concept of “clickable” links to users. Typically, hyperlin...
Joachim Schwieren, Gottfried Vossen
HICSS
2007
IEEE
133views Biometrics» more  HICSS 2007»
13 years 11 months ago
Service-Oriented Software Reengineering: SoSR
Service-Oriented Computing (SOC) enables the development and design of loosely coupled software components for integration with other software system. Since most legacy system wer...
Sam Chung, Joseph Byung Chul An, Sergio Davalos
APSEC
2007
IEEE
13 years 11 months ago
Coordination-Policy Based Composed System Behavior Derivation
The coordination-policy that components interactions satisfied often determines the properties of nowadays component-based information systems, e.g. Safety, Liveness and Fairness ...
Yiming Lau, Wenyun Zhao, Xin Peng, Zhixiong Jiang,...
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
13 years 11 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...
CISIM
2008
IEEE
13 years 11 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
CISIM
2008
IEEE
13 years 11 months ago
Tuning Struggle Strategy in Genetic Algorithms for Scheduling in Computational Grids
Job Scheduling on Computational Grids is gaining importance due to the need for efficient large-scale Grid-enabled applications. Among different optimization techniques addressed ...
Fatos Xhafa, Bernat Duran, Ajith Abraham, Keshav P...
CISIM
2008
IEEE
13 years 11 months ago
Scheduling in Multiprocessor System Using Genetic Algorithms
Multiprocessors have emerged as a powerful computing means for running real-time applications, especially where a uniprocessor system would not be sufficient enough to execute all...
Keshav P. Dahal, M. Alamgir Hossain, Benny Varghes...
CISIM
2008
IEEE
13 years 11 months ago
Tensor Decomposition for 3D Bars Problem
In this paper, we compare performance of several dimension reduction techniques, namely SVD, NMF and SDD.The qualitative comparison is evaluated on a collection of bars. We compare...
Jan Platos, Jana Kocibova, Pavel Krömer, Pave...
INFOSCALE
2009
ACM
13 years 11 months ago
Measuring IP Address Fragmentation from BGP Routing Dynamics
Address Fragmentation plays a key role in the exponential growth of DFZ routing table, known as the scalability problem of current Internet. In this paper, we measure the severity ...
Xia Yin, Xin Wu, Zhiliang Wang