Sciweavers

1043 search results - page 69 / 209
» Monitoring Service
Sort
View
COMPSAC
2005
IEEE
15 years 9 months ago
Constraint Violation Detection: A Fundamental Part of Software Cybernetics
Monitoring of sensitive events is a key step for controlling the behavior of software. Specifying a sufficient set of constraints prior to software deployment is necessary for det...
Qianxiang Wang
129
Voted
CSREAEEE
2006
118views Business» more  CSREAEEE 2006»
15 years 5 months ago
Analyzing and Modeling a Multiparty Outsourcing Environment
: This paper discusses the complexities involved in managing and monitoring the delivery of IT services in a multiparty outsourcing environment. The complexities identified are gro...
S. David Peter, K. Poulose Jacob, Sreela Sasi
WISE
2010
Springer
15 years 1 months ago
On Identifying and Reducing Irrelevant Information in Service Composition and Execution
The increasing availability of massive information on the Web causes the need for information aggregation by filtering and ranking according to user's goals. In the last years...
Hong Linh Truong, Marco Comerio, Andrea Maurino, S...
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu
JUCS
2010
96views more  JUCS 2010»
15 years 2 months ago
Multi-Level Context Management and Inference Framework for Smart Telecommunication Services
: Telco operators and other players are searching for intelligent value-added services, i.e., communication applications that take advantage of the huge amount of user data availab...
Carlos Baladrón Zorita, Alejandro Cadenas, ...