Sciweavers

121 search results - page 20 / 25
» Data Assurance in Opaque Computations
Sort
View
AUTONOMICS
2009
ACM
15 years 6 months ago
Sensor Selection for IT Infrastructure Monitoring
Supervisory control is the main means to assure a high level performance and availability of large IT infrastructures. Applied control theory is used in physical and virtualization...
Gergely János Paljak, Imre Kocsis, Zolt&aac...
AINA
2007
IEEE
15 years 6 months ago
Detecting Coordinated Distributed Multiple Attacks
This paper describes results concerning the robustness and generalization capabilities of kernel methods in detecting coordinated distributed multiple attacks (CDMA) using network...
Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Ba...
PRDC
2006
IEEE
15 years 5 months ago
Towards Timely ACID Transactions in DBMS
On-time data management is becoming a key difficulty faced by the information infrastructure of most organizations. In fact, database applications for critical areas are increasing...
Marco Vieira, António Casimiro Costa, Henri...
ADHOCNOW
2008
Springer
15 years 6 months ago
DIN: An Ad-Hoc Algorithm to Estimate Distances in Wireless Sensor Networks
Abstract. A current challenge in wireless sensor networks is the positioning of sensor nodes for indoor environments without dedicated hardware. Especially in this domain, many app...
Freddy López Villafuerte, Jochen H. Schille...
KBSE
2005
IEEE
15 years 5 months ago
Automated population of causal models for improved software risk assessment
Recent work in applying causal modeling (Bayesian networks) to software engineering has resulted in improved decision support systems for software project managers. Once the causa...
Peter Hearty, Norman E. Fenton, Martin Neil, Patri...