Sciweavers

5723 search results - page 1011 / 1145
» Network Management
Sort
View
SECURWARE
2008
IEEE
15 years 10 months ago
Rating Agencies Interoperation for Peer-to-Peer Online Transactions
— In current peer-to-peer systems users interact with unknown services and users for the purpose of online transactions such as file sharing and trading of commodities. Peer-to-...
Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Lui...
SECURWARE
2008
IEEE
15 years 10 months ago
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACLs could have inconsistencies, allowing traffic that should be denied o...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...
CIDM
2007
IEEE
15 years 10 months ago
Analysis of streaming GPS measurements of surface displacement through a web services environment
Abstract— We present a method for performing mode classification of real-time streams of GPS surface position data. Our approach has two parts: an algorithm for robust, unconstr...
Robert Granat, Galip Aydin, Marlon E. Pierce, Zhig...
CNSR
2007
IEEE
122views Communications» more  CNSR 2007»
15 years 10 months ago
Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology
Critical infrastructure systems are complex networks of adaptive socio-technical systems that provide the most fundamental requirements of the society. Their importance in the smo...
Ebrahim Bagheri, Ali A. Ghorbani
FBIT
2007
IEEE
15 years 10 months ago
Unsupervised Learning in Spectral Genome Analysis
The tree representation as a model for organismal evolution has been in use since before Darwin. However, with the recent unprecedented access to biomolecular data it has been dis...
Lutz Hamel, Neha Nahar, Maria S. Poptsova, Olga Zh...
« Prev « First page 1011 / 1145 Last » Next »