Sciweavers

310 search results - page 57 / 62
» Declarative configuration management for complex and dynamic...
Sort
View
100
Voted
CSCWD
2001
Springer
15 years 2 months ago
Modeling Workflow within Distributed Systems
Workflow management techniques are aiming at supporting business process across organization boundaries. Current techniques are lacking of the formalism tools to model and analyze...
Yuhong Yan, Alex Bejan
PERCOM
2006
ACM
15 years 9 months ago
Adaptive Medical Feature Extraction for Resource Constrained Distributed Embedded Systems
Tiny embedded systems have not been an ideal outfit for high performance computing due to their constrained resources. Limitations in processing power, battery life, communication ...
Roozbeh Jafari, Hyduke Noshadi, Majid Sarrafzadeh,...
DFN
2003
14 years 11 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
83
Voted
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 3 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
EMS
2009
IEEE
15 years 4 months ago
Simulation of a Smart Grid City with Software Agents
—In the future smart city, new information and communication technologies will enable a better management of the available resources. The future smart grid infrastructure is emer...
Stamatis Karnouskos, Thiago Nass de Holanda