Sciweavers

578 search results - page 107 / 116
» Accounting Management in a TINA-Based Service and Network En...
Sort
View
CONEXT
2009
ACM
14 years 10 months ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...
ECIS
2003
14 years 11 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
SECURWARE
2008
IEEE
15 years 4 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
ECTEL
2007
Springer
15 years 3 months ago
Scruffy Technologies to Enable (Work-integrated) Learning
Abstract. The goal of the APOSDLE (Advanced Process-Oriented SelfDirected Learning environment) project is to support work-integrated learning of knowledge workers. We argue that w...
Stefanie N. Lindstaedt, Peter Scheir, Armin Ulbric...
SECON
2008
IEEE
15 years 4 months ago
A Demonstration of Video over a User Centric Prioritization Scheme for Wireless LANs
—Due to the unreliable nature of the wireless medium, provisioning of the Quality of Service (QoS) in wireless LANs is by far more complicated than in wired networks. In this dem...
Konstantinos Choumas, Thanasis Korakis, Leandros T...