Sciweavers

8080 search results - page 301 / 1616
» From Computer Networks to Agent Networks
Sort
View
CHI
1997
ACM
15 years 8 months ago
How to Personalize the Web
Agents can personalize otherwise impersonal computational systems. The World Wide Web presents the same appearance to every user regardless of that user’s past activity. Web Bro...
Rob Barrett, Paul P. Maglio, Daniel C. Kellem
ACSAC
2008
IEEE
15 years 11 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
PAM
2011
Springer
14 years 7 months ago
FACT: Flow-Based Approach for Connectivity Tracking
More than 20 years after the launch of the public Internet, operator forums are still full of reports about temporary unreachability of complete networks. We propose FACT, a system...
Dominik Schatzmann, Simon Leinen, Jochen Köge...
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
14 years 7 months ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
GLOBECOM
2007
IEEE
15 years 6 months ago
Route Optimization for Large Scale Network Mobility Assisted by BGP
—This paper presents a novel scheme that enables IPv6 mobile networks to perform optimal route optimization. The proposed scheme exploits features of the widely deployed border g...
Feriel Mimoune, Farid Naït-Abdesselam, Tarik ...