Sciweavers

819 search results - page 91 / 164
» Component-oriented network management system development
Sort
View
SIGCOMM
2010
ACM
15 years 3 days ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
WWW
2006
ACM
16 years 17 days ago
Wake-on-WLAN
In bridging the digital divide, two important criteria are cost-effectiveness, and power optimization. While 802.11 is cost-effective and is being used in several installations in...
Nilesh Mishra, Kameswari Chebrolu, Bhaskaran Raman...
CSE
2009
IEEE
15 years 6 months ago
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks
Recent research identifies a growing privacy problem that exists within Online Social Networks (OSNs). Several studies have shown how easily strangers can extract personal data a...
Lerone Banks, Shyhtsun Felix Wu
LISA
1994
15 years 1 months ago
The Group Administration Shell and the GASH Network Computing Environment
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...
Jonathan Abbey
ICAI
2008
15 years 1 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang