Sciweavers

13180 search results - page 2310 / 2636
» Network Models
Sort
View
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 5 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
150
Voted
GISCIENCE
2010
Springer
212views GIS» more  GISCIENCE 2010»
15 years 5 months ago
Qualitative Change to 3-Valued Regions
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...
DAIS
2009
15 years 5 months ago
Foraging for Better Deployment of Replicated Service Components
Abstract. Our work focuses on distributed software services and their requirements in terms of system performance and dependability. We target the problem of finding optimal deploy...
Máté J. Csorba, Hein Meling, Poul E....
SIGCOMM
2010
ACM
15 years 4 months ago
How green is IP-telephony?
With constantly increasing costs of energy, we ask ourselves what we can say about the energy efficiency of existing VoIP systems. To answer that question, we gather information a...
Salman Abdul Baset, Joshua Reich, Jan Janak, Pavel...
HICSS
2008
IEEE
105views Biometrics» more  HICSS 2008»
15 years 4 months ago
Evaluating the Effect of Upgrade, Control and Development Strategies on Robustness and Failure Risk of the Power Transmission Gr
We use the OPA complex systems model of the power transmission system to investigate the effect of a series of different network upgrade scenarios on the long time dynamics and th...
David E. Newman, Benjamin A. Carreras, Vickie E. L...
« Prev « First page 2310 / 2636 Last » Next »