Sciweavers

1845 search results - page 136 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
CONEXT
2010
ACM
14 years 12 months ago
Assessing the vulnerability of replicated network services
Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a serv...
George Dean Bissias, Brian Neil Levine, Ramesh K. ...
96
Voted
JDCTA
2010
95views more  JDCTA 2010»
14 years 8 months ago
WebAccess Based Remote Graphic Surveillance System for Mechatronics
This study employed WebAccess software to construct a remote graphic surveillance system, which was developed differently from previous remote monitoring systems. Advantech WebAcc...
Wen-Jye Shyr, Chia-Ming Lin, Wei-Ting Chiang
PAM
2011
Springer
14 years 4 months ago
FACT: Flow-Based Approach for Connectivity Tracking
More than 20 years after the launch of the public Internet, operator forums are still full of reports about temporary unreachability of complete networks. We propose FACT, a system...
Dominik Schatzmann, Simon Leinen, Jochen Köge...
95
Voted
WWW
2009
ACM
16 years 2 months ago
Fast dynamic reranking in large graphs
In this paper we consider the problem of re-ranking search results by incorporating user feedback. We present a graph theoretic measure for discriminating irrelevant results from ...
Purnamrita Sarkar, Andrew W. Moore
WWW
2006
ACM
16 years 2 months ago
On a service-oriented approach for an engineering knowledge desktop
Increasingly, manufacturing companies are shifting their focus from selling products to providing services. As a result, when designing new products, engineers must increasingly c...
Sylvia C. Wong, Richard M. Crowder, Gary B. Wills