Sciweavers

8479 search results - page 1459 / 1696
» Data Extraction from Web Data Sources
Sort
View
137
Voted
MIDDLEWARE
2009
Springer
15 years 10 months ago
Why Do Upgrades Fail and What Can We Do about It?
Abstract. Enterprise-system upgrades are unreliable and often produce downtime or data-loss. Errors in the upgrade procedure, such as broken dependencies, constitute the leading ca...
Tudor Dumitras, Priya Narasimhan
ACSAC
2008
IEEE
15 years 10 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
FDL
2007
IEEE
15 years 10 months ago
Mapping Actor-Oriented Models to TLM Architectures
Actor-oriented modeling approaches are convenient for implementing functional models of embedded systems. Architectural models for heterogeneous system-on-chip architectures, howe...
Jens Gladigau, Christian Haubelt, Bernhard Niemann...
GLOBECOM
2007
IEEE
15 years 10 months ago
Hierarchically Clustered P2P Streaming System
Abstract— Peer-to-peer video streaming has been gaining popularity. However, it is still challenging to manage a P2P system efficiently to support high video playback rate. In t...
Chao Liang, Yang Guo, Yong Liu
IPCCC
2007
IEEE
15 years 10 months ago
Streaming in MANET: Proactive Link Protection and Receiver-Oriented Adaptation
Multimedia streaming applications can significantly boost the value of mobile ad hoc networks (MANET). Live streaming, however, means continuous data delivery, which is a major c...
Toby Xu, Ymg Cai
« Prev « First page 1459 / 1696 Last » Next »