Sciweavers

1122 search results - page 118 / 225
» Information Retrieval in Network Administration
Sort
View
SACMAT
2009
ACM
15 years 6 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...
FGCN
2008
IEEE
199views Communications» more  FGCN 2008»
15 years 6 months ago
A Context-Sensitive Rule-Based Architecture for a Smart Building Environment
In a smart building environment nomadic users can benefit from specialised contextsensitive services. These can increase productivity and offer an improved lifestyle for users. Th...
John Herbert, John O'Donoghue, Xiang Chen
INFOCOM
2007
IEEE
15 years 5 months ago
Understanding BGP Session Failures in a Large ISP
Abstract—The current global Internet routing frequently suffers from cascading routing changes and slow routing convergence. Such instability can significantly affect the perfor...
Lan Wang, Malleswari Saranu, Joel Gottlieb, Dan Pe...
ISW
2004
Springer
15 years 4 months ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...
SIGIR
2003
ACM
15 years 4 months ago
Apoidea: A Decentralized Peer-to-Peer Architecture for Crawling the World Wide Web
This paper describes a decentralized peer-to-peer model for building a Web crawler. Most of the current systems use a centralized client-server model, in which the crawl is done by...
Aameek Singh, Mudhakar Srivatsa, Ling Liu, Todd Mi...