Sciweavers

182 search results - page 36 / 37
» Information Flow in Disaster Management Systems
Sort
View
115
Voted
DSVIS
2008
Springer
15 years 1 months ago
Towards a Library of Workflow User Interface Patterns
Abstract. A collection of user interface design patterns for workflow information systems is presented. Each Workflow User Interface Pattern (WUIP) is characterized by properties e...
Josefina Guerrero García, Jean Vanderdonckt...
CCS
2003
ACM
15 years 4 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
81
Voted
SIGCOMM
2010
ACM
14 years 12 months ago
Energy proportionality of an enterprise network
Energy efficiency is becoming increasingly important in the operation of networking infrastructure, especially in enterprise and data center networks. While strategies for lowerin...
Priya Mahadevan, Sujata Banerjee, Puneet Sharma
WWW
2005
ACM
16 years 9 days ago
Ensuring required failure atomicity of composite Web services
The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...
Sami Bhiri, Olivier Perrin, Claude Godart
NSDI
2010
15 years 1 months ago
Glasnost: Enabling End Users to Detect Traffic Differentiation
Holding residential ISPs to their contractual or legal obligations of "unlimited service" or "network neutrality" is hard because their traffic management poli...
Marcel Dischinger, Massimiliano Marcon, Saikat Guh...