Sciweavers

151 search results - page 24 / 31
» Cleaning a network with brushes
Sort
View
131
Voted
JUCS
2010
96views more  JUCS 2010»
15 years 8 days ago
Multi-Level Context Management and Inference Framework for Smart Telecommunication Services
: Telco operators and other players are searching for intelligent value-added services, i.e., communication applications that take advantage of the huge amount of user data availab...
Carlos Baladrón Zorita, Alejandro Cadenas, ...
121
Voted
CLOUDCOM
2010
Springer
14 years 12 months ago
A Comparison and Critique of Eucalyptus, OpenNebula and Nimbus
Eucalyptus, OpenNebula and Nimbus are three major open-source cloud-computing software platforms. The overall function of these systems is to manage the provisioning of virtual ma...
Peter Sempolinski, Douglas Thain
133
Voted
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
14 years 11 months ago
Data Editing Techniques to Allow the Application of Distance-Based Outlier Detection to Streams
The problem of finding outliers in data has broad applications in areas as diverse as data cleaning, fraud detection, network monitoring, invasive species monitoring, etc. While th...
Vit Niennattrakul, Eamonn J. Keogh, Chotirat Ann R...
104
Voted
MIDDLEWARE
2004
Springer
15 years 7 months ago
iOverlay: A Lightweight Middleware Infrastructure for Overlay Application Implementations
The very nature of implementing and evaluating fully distributed algorithms or protocols in application-layer overlay networks involves certain programming tasks that are at best m...
Baochun Li, Jiang Guo, Mea Wang
127
Voted
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 8 months ago
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace
—Today, middleboxes such as firewalls and network address translators have advanced beyond simple packet forwarding and address mapping. They also inspect and filter traffic, ...
Tobias Heer, René Hummen, Miika Komu, Stefa...