Sciweavers

5684 search results - page 300 / 1137
» Computing with active dendrites
Sort
View
CLOUDCOM
2009
Springer
15 years 11 months ago
SLA-Driven Adaptive Resource Management for Web Applications on a Heterogeneous Compute Cloud
Current service-level agreements (SLAs) offered by cloud providers make guarantees about quality attributes such as availability. However, although one of the most important quali...
Waheed Iqbal, Matthew Dailey, David N. Carrera
ICALT
2008
IEEE
15 years 11 months ago
Interaction Analysis as a Multi-Support Approach of Social Computing for Learning, in the "Collaborative Era": Lessons Learned b
Apparently computer technology is shifting its focus, with individual users not being the main target any more. The evolution of Web 2.0 technologies is promoting the development ...
Tharrenos Bratitsis, Angelique Dimitracopoulou
IEEEARES
2006
IEEE
15 years 10 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ESOP
2005
Springer
15 years 10 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
164
Voted
SFM
2005
Springer
243views Formal Methods» more  SFM 2005»
15 years 10 months ago
Hermes: Agent-Based Middleware for Mobile Computing
Hermes is a middleware system for design and execution of activity-based applications in distributed environments. It supports mobile computation as an application implementation s...
Flavio Corradini, Emanuela Merelli