Sciweavers

221 search results - page 37 / 45
» Model-based management of security services in complex netwo...
Sort
View
EUROPAR
2006
Springer
15 years 3 months ago
Context Awareness: An Experiment with Hoarding
Abstract. Computer mobility allows people to use computers in varied and changing environments. This variability forces applications to adapt thus requiring awareness of the comput...
João Garcia, Luís Veiga, Paulo Ferre...
CN
2004
256views more  CN 2004»
14 years 11 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
ICETE
2004
204views Business» more  ICETE 2004»
15 years 1 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
WWW
2004
ACM
16 years 8 days ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
93
Voted
GRID
2004
Springer
15 years 5 months ago
Distributed Ant: A System to Support Application Deployment in the Grid
e-Science has much to benefit from the emerging field of grid computing. However, construction of e-Science grids is a complex and inefficient undertaking. In particular, deployme...
Wojtek Goscinski, David Abramson