Sciweavers

8770 search results - page 1538 / 1754
» Named Service Networking
Sort
View
DSN
2002
IEEE
15 years 4 months ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach
NOMS
2002
IEEE
127views Communications» more  NOMS 2002»
15 years 4 months ago
Intelligent search of correlated alarms from database containing noise data
Alarm correlation plays an important role in improving the service and reliability in modern telecommunication networks. Most previous research of alarm correlation didn’t consi...
Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma
WMCSA
2002
IEEE
15 years 4 months ago
Composing Pervasive Data Using iQL
The emergence of pervasive networked data sources, such as web services, sensors, and mobile devices, enables context-sensitive, mobile applications. We have developed a programmi...
Norman H. Cohen, Hui Lei, Paul Castro, John S. Dav...
ERCIMDL
2001
Springer
171views Education» more  ERCIMDL 2001»
15 years 3 months ago
MARIAN: Flexible Interoperability for Federated Digital Libraries
Federated digital libraries are composed of distributed, autonomous, and often heterogeneous information services but provide users with a transparent, integrated view of collected...
Marcos André Gonçalves, Robert K. Fr...
FC
2001
Springer
123views Cryptology» more  FC 2001»
15 years 3 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
« Prev « First page 1538 / 1754 Last » Next »