Sciweavers

5723 search results - page 1069 / 1145
» Network Management
Sort
View
109
Voted
LISA
2007
15 years 2 months ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar
EDBT
2010
ACM
185views Database» more  EDBT 2010»
15 years 2 months ago
Probabilistic threshold k nearest neighbor queries over moving objects in symbolic indoor space
The availability of indoor positioning renders it possible to deploy location-based services in indoor spaces. Many such services will benefit from the efficient support for k n...
Bin Yang 0002, Hua Lu, Christian S. Jensen
106
Voted
CEAS
2008
Springer
15 years 2 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
118
Voted
EDCC
2008
Springer
15 years 2 months ago
A Distributed Approach to Autonomous Fault Treatment in Spread
This paper presents the design and implementation of the Distributed Autonomous Replication Management (DARM) framework built on top of the Spread group communication system. The ...
Hein Meling, Joakim L. Gilje
105
Voted
INFOSCALE
2007
ACM
15 years 2 months ago
Query-driven indexing for scalable peer-to-peer text retrieval
We present a query-driven algorithm for the distributed indexing of large document collections within structured P2P networks. To cope with bandwidth consumption that has been ide...
Gleb Skobeltsyn, Toan Luu, Ivana Podnar Zarko, Mar...
« Prev « First page 1069 / 1145 Last » Next »