Sciweavers

2669 search results - page 234 / 534
» Improvement of a configuration management system
Sort
View
111
Voted
SOSP
2005
ACM
15 years 10 months ago
Connections: using context to enhance file search
Connections is a file system search tool that combines traditional content-based search with context information gathered from user activity. By tracing file system calls, Conne...
Craig A. N. Soules, Gregory R. Ganger
ISCC
2003
IEEE
138views Communications» more  ISCC 2003»
15 years 7 months ago
Performance Evaluation of Hop-by-Hop Local Mobility Agents Probing for Mobile IPv6
Mobile IPv6 (MIPv6) and Fast Handover (FHO) have been developed by the Internet Engineering Task Force (IETF) to address the IP mobility issues of roaming mobile devices, and to r...
Vrizlynn L. L. Thing, Henry C. J. Lee, Yi Xu
ACSAC
2002
IEEE
15 years 6 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
IAW
2003
IEEE
15 years 7 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.
OPODIS
2010
14 years 11 months ago
Self-stabilizing (k, r)-Clustering in Wireless Ad-hoc Networks with Multiple Paths
Abstract. Wireless Ad-hoc networks are distributed systems that often reside in error-prone environments. Self-stabilization lets the system recover autonomously from an arbitrary ...
Andreas Larsson, Philippas Tsigas