Sciweavers

1153 search results - page 170 / 231
» Component Search Service and Deployment of Distributed Appli...
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 7 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
MIDDLEWARE
2004
Springer
15 years 5 months ago
A message-oriented middleware for sensor networks
The miniaturization of hardware components has lead to the development of Wireless Sensor Networks (WSN) and networked-applications over them. Meanwhile, middleware systems have a...
Eduardo Souto, Germano Guimarães, Glauco Va...
103
Voted
ICDCS
1996
IEEE
15 years 4 months ago
Scaling Heterogeneous Databases and the Design of Disco
Access to large numbers of data sources introduces new problems for users of heterogeneous distributed databases. End users and application programmers must deal with unavailable ...
Anthony Tomasic, Louiqa Raschid, Patrick Valduriez
84
Voted
ICCD
2002
IEEE
164views Hardware» more  ICCD 2002»
15 years 9 months ago
Locating Tiny Sensors in Time and Space: A Case Study
— As the cost of embedded sensors and actuators drops, new applications will arise that exploit high density networks of small devices capable of a variety of sensing tasks. Alth...
Lewis Girod, Vladimir Bychkovskiy, Jeremy Elson, D...
LANOMS
2007
IEEE
149views Education» more  LANOMS 2007»
15 years 6 months ago
Management Issues on Wireless Mesh Networks
—Wireless Mesh Networks (WMN) are emerging as a flexible and low-cost alternative to provide digital inclusion through multi-hop communications, supporting applications from las...
Jairo L. Duarte, Diego G. Passos, Rafael L. Valle,...