Sciweavers

259 search results - page 35 / 52
» Designing Information Appliances Using a Resource Replicatio...
Sort
View
APCCM
2006
15 years 1 months ago
On the suitability of UML 2.0 activity diagrams for business process modelling
UML is posited as the "swiss army knife" for systems modelling and design activities. It embodies a number of modelling formalisms that have broad applicability in captu...
Nick Russell, Wil M. P. van der Aalst, Arthur H. M...
ACSAC
2005
IEEE
15 years 5 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
JDCTA
2010
143views more  JDCTA 2010»
14 years 6 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
ISN
1995
Springer
15 years 3 months ago
Managing the TMN
Metamanagement provides a means to manage the management processes, systems and software comprising a TMN system. In this paper we present the basic requirements of metamanagement,...
Stelios Sartzetakis, Costas Stathopoulos, Vana Kal...
104
Voted
SIGCOMM
2006
ACM
15 years 5 months ago
Growth codes: maximizing sensor network data persistence
Sensor networks are especially useful in catastrophic or emergency scenarios such as floods, fires, terrorist attacks or earthquakes where human participation may be too dangero...
Abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rube...