Sciweavers

459 search results - page 40 / 92
» Malware Models for Network and Service Management
Sort
View
ICRA
2002
IEEE
84views Robotics» more  ICRA 2002»
15 years 6 months ago
Queueing Network Modeling and Lead Time Compression of Electronic Procurement
Abstract- Procurement, i.e., the process of obtaining materials or services and managing their inflow into organizations, is a critical process in supply chain management. Internet...
C. V. L. Raju, Y. Narahari
WICON
2008
15 years 3 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
COMPSAC
2008
IEEE
15 years 8 months ago
SCCM: Service-Oriented Community Coordinated Multimedia Architecture
Community coordinated multimedia (CCM) envisions the paradigm of consuming multiple media via diversity display devices, converged networks, and heterogeneous platforms within a v...
Jiehan Zhou, Mika Rautiainen, Mika Ylianttila
WICON
2010
14 years 11 months ago
Distributed Management of Contextual Affinities in Context-aware Systems
In context-aware computing, distributed information about entities, such as people, places and objects, is captured and made available to applications, which utilize this context....
Robert Schmohl, Uwe Baumgarten
SOSP
1997
ACM
15 years 3 months ago
Distributed Schedule Management in the Tiger Video Fileserver
Tiger is a scalable, fault-tolerant video file server constructed from a collection of computers connected by a switched network. All content files are striped across all of the c...
William J. Bolosky, Robert P. Fitzgerald, John R. ...