Sciweavers

5723 search results - page 894 / 1145
» Network Management
Sort
View
COOPIS
2003
IEEE
15 years 10 months ago
Learning to Invoke Web Forms
Emerging Web standards promise a network of heterogeneous yet interoperable Web Services. Web Services would greatly simplify the development of many kinds of information agents a...
Nicholas Kushmerick
DISCEX
2003
IEEE
15 years 10 months ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
138
Voted
IAW
2003
IEEE
15 years 10 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
ICDCSW
2003
IEEE
15 years 10 months ago
Revealing the Retail Black Box by Interaction Sensing
Today a huge variety of methods to track and analyze the customers’ behavior in e-commerce systems is available. However, in traditional retail stores such systems are not widel...
Christian Decker, Uwe Kubach, Michael Beigl
ICDCSW
2003
IEEE
15 years 10 months ago
A Study of the Performance and Parameter Sensitivity of Adaptive Distributed Caching
A self-organized approach to manage a distributed proxy system called Adaptive Distributed Caching (ADC) has been proposed previously. We model each proxy as an autonomous agent th...
Markus J. Kaiser, Kwok Ching Tsui, Jiming Liu