Sciweavers

1153 search results - page 170 / 231
» Component Search Service and Deployment of Distributed Appli...
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 10 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
142
Voted
MIDDLEWARE
2004
Springer
15 years 9 months ago
A message-oriented middleware for sensor networks
The miniaturization of hardware components has lead to the development of Wireless Sensor Networks (WSN) and networked-applications over them. Meanwhile, middleware systems have a...
Eduardo Souto, Germano Guimarães, Glauco Va...
126
Voted
ICDCS
1996
IEEE
15 years 8 months ago
Scaling Heterogeneous Databases and the Design of Disco
Access to large numbers of data sources introduces new problems for users of heterogeneous distributed databases. End users and application programmers must deal with unavailable ...
Anthony Tomasic, Louiqa Raschid, Patrick Valduriez
113
Voted
ICCD
2002
IEEE
164views Hardware» more  ICCD 2002»
16 years 26 days ago
Locating Tiny Sensors in Time and Space: A Case Study
— As the cost of embedded sensors and actuators drops, new applications will arise that exploit high density networks of small devices capable of a variety of sensing tasks. Alth...
Lewis Girod, Vladimir Bychkovskiy, Jeremy Elson, D...
138
Voted
LANOMS
2007
IEEE
149views Education» more  LANOMS 2007»
15 years 10 months ago
Management Issues on Wireless Mesh Networks
—Wireless Mesh Networks (WMN) are emerging as a flexible and low-cost alternative to provide digital inclusion through multi-hop communications, supporting applications from las...
Jairo L. Duarte, Diego G. Passos, Rafael L. Valle,...