Sciweavers

1153 search results - page 170 / 231
» Component Search Service and Deployment of Distributed Appli...
Sort
View
129
Voted
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 10 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
138
Voted
MIDDLEWARE
2004
Springer
15 years 9 months ago
A message-oriented middleware for sensor networks
The miniaturization of hardware components has lead to the development of Wireless Sensor Networks (WSN) and networked-applications over them. Meanwhile, middleware systems have a...
Eduardo Souto, Germano Guimarães, Glauco Va...
123
Voted
ICDCS
1996
IEEE
15 years 7 months ago
Scaling Heterogeneous Databases and the Design of Disco
Access to large numbers of data sources introduces new problems for users of heterogeneous distributed databases. End users and application programmers must deal with unavailable ...
Anthony Tomasic, Louiqa Raschid, Patrick Valduriez
109
Voted
ICCD
2002
IEEE
164views Hardware» more  ICCD 2002»
16 years 18 days ago
Locating Tiny Sensors in Time and Space: A Case Study
— As the cost of embedded sensors and actuators drops, new applications will arise that exploit high density networks of small devices capable of a variety of sensing tasks. Alth...
Lewis Girod, Vladimir Bychkovskiy, Jeremy Elson, D...
136
Voted
LANOMS
2007
IEEE
149views Education» more  LANOMS 2007»
15 years 10 months ago
Management Issues on Wireless Mesh Networks
—Wireless Mesh Networks (WMN) are emerging as a flexible and low-cost alternative to provide digital inclusion through multi-hop communications, supporting applications from las...
Jairo L. Duarte, Diego G. Passos, Rafael L. Valle,...