Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Performance and power are critical design constraints in today’s high-end computing systems. Reducing power consumption without impacting system performance is a challenge for t...
Rong Ge, Xizhou Feng, Wu-chun Feng, Kirk W. Camero...
Track 2 - Modeling and Abstraction of Services Process Session Chair: Dynamic Service Invocation Control in Service Composition Environments (SCC2010-2004) ...........................
Current geographic information systems (GISs) have been designed for querying and maintaining static databases representing static phenomena and give little support to those users ...
The project SESAME uses semantic modeling and reasoning to support home owners and building managers in saving energy and in optimizing their energy costs while maintaining their ...