Sciweavers

1791 search results - page 205 / 359
» Behavioral Operations
Sort
View
123
Voted
NOMS
1998
IEEE
133views Communications» more  NOMS 1998»
15 years 8 months ago
ATM customer network management using WWW and CORBA technologies
In this paper, we present a framework for managing ATM customer networks using WWW and CORBA technologies. The WWW technology may provide network management operators with platfor...
Jong-Wook Baek, Tae-Joon Ha, Jong-Tae Park, James ...
131
Voted
WSC
2001
15 years 5 months ago
Satellite communications representation in network simulation
This paper presents methodologies to represent satellite communications (SATCOM) behaviors in network simulation. This paper is based on tasks performed for generic network warfar...
Kenneth Y. Jo
EUROSYS
2007
ACM
16 years 1 months ago
Macroprogramming heterogeneous sensor networks using cosmos
In this paper, we present COSMOS, a novel architecture for macroprogramming heterogeneous sensor network systems. Macroprogramming entails aggregate system behavior specification...
Asad Awan, Suresh Jagannathan, Ananth Grama
165
Voted
DASFAA
2009
IEEE
191views Database» more  DASFAA 2009»
15 years 10 months ago
Benchmarking Performance-Critical Components in a Native XML Database System
The rapidly increasing number of XML-related applications indicates a growing need for efficient, dynamic, and native XML support in database management systems (XDBMS). So far, bo...
Karsten Schmidt 0002, Sebastian Bächle, Theo ...
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 10 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...