Sciweavers

948 search results - page 147 / 190
» Analysis of SITA policies
Sort
View
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 6 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
CISS
2008
IEEE
15 years 6 months ago
Secure transmission power of cognitive radios for dynamic spectrum access applications
—One of the major concerns of cognitive radios when used for secondary spectrum access is the potential of interfering primary users, considering especially that cognitive radios...
Xiaohua Li, Jinying Chen, Fan Ng
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
15 years 6 months ago
Internet Users' Beliefs about Government Surveillance - The Role of Social Awareness and Internet Literacy
This study focuses on exploring Internet literacy and social awareness as antecedents to Internet users’ attitudes towards government surveillance in the Internet environment. P...
Tamara Dinev
ICDM
2008
IEEE
179views Data Mining» more  ICDM 2008»
15 years 6 months ago
Detection and Exploration of Outlier Regions in Sensor Data Streams
Sensor networks play an important role in applications concerned with environmental monitoring, disaster management, and policy making. Effective and flexible techniques are need...
Conny Franke, Michael Gertz
ICC
2007
IEEE
15 years 6 months ago
Toward Valley-Free Inter-domain Routing
ASes in inter-domain routing receive little information about the quality of the routes they receive. This lack of information can lead to inefficient and even incorrect routing....
Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monro...