Sciweavers

18924 search results - page 3459 / 3785
» Conformance of Distributed Systems
Sort
View
CONEXT
2008
ACM
15 years 6 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
CONEXT
2008
ACM
15 years 6 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
CSCW
2008
ACM
15 years 6 months ago
Evaluating the deployment of a mobile technology in a hospital ward
Since health care teams are often distributed across time and location, information sharing is crucial for effective patient care. Studying the use of a mobile information technol...
Charlotte Tang, M. Sheelagh T. Carpendale
CSCW
2008
ACM
15 years 6 months ago
Transactive memory in trauma resuscitation
This paper describes an ethnographic study conducted to explore the possibilities for future design and development of technological support for trauma teams. We videotaped 10 tra...
Aleksandra Sarcevic, Ivan Marsic, Michael E. Lesk,...
DMSN
2008
ACM
15 years 6 months ago
Stream-based macro-programming of wireless sensor, actuator network applications with SOSNA
Wireless sensor, actuator networks (WSANs) distinguish themselves from wireless sensor networks by the need to coordinate actuators' actions, real-time constraints on communi...
Marcin Karpinski, Vinny Cahill
« Prev « First page 3459 / 3785 Last » Next »