Sciweavers

7544 search results - page 1396 / 1509
» Network Forensics Analysis
Sort
View
IGARSS
2010
15 years 1 months ago
Lidar education at Georgia Tech
The Georgia Tech Research Institute teamed with a local undergraduate women's institution, Agnes Scott College, to develop an eyesafe lidar for atmospheric remote sensing as ...
Gary Gimmestad, Leanne West
IKE
2010
15 years 1 months ago
Towards Context-Aware Real-Time Information Dissemination
Real-time information dissemination is essential for the success of key applications such as transportation management and battlefield monitoring. In these applications, relevant ...
Kyoung-Don Kang, Greg Vert
INFOCOM
2010
IEEE
15 years 1 months ago
Surfing the Blogosphere: Optimal Personalized Strategies for Searching the Web
We propose a distributed mechanism for finding websurfing strategies that is inspired by the StumbleUpon recommendation engine. Each day, a websurfer visits a sequence of websites ...
Stratis Ioannidis, Laurent Massoulié
SOCIALCOM
2010
15 years 1 months ago
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organi...
Wei Wei, Ting Yu
146
Voted
CF
2009
ACM
15 years 1 months ago
High accuracy failure injection in parallel and distributed systems using virtualization
Emulation sits between simulation and experimentation to complete the set of tools available for software designers to evaluate their software and predict behavior under condition...
Thomas Hérault, Thomas Largillier, Sylvain ...
« Prev « First page 1396 / 1509 Last » Next »