Sciweavers

450 search results - page 62 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
USENIX
2008
15 years 2 days ago
Improving Scalability and Fault Tolerance in an Application Management Infrastructure
This paper explores the challenges associated with distributed application management in large-scale computing environments. In particular, we investigate several techniques for e...
Nikolay Topilski, Jeannie R. Albrecht, Amin Vahdat
ANNS
2007
14 years 11 months ago
Direct and indirect classification of high-frequency LNA performance using machine learning techniques
The task of determining low noise amplifier (LNA) high-frequency performance in functional testing is as challenging as designing the circuit itself due to the difficulties associa...
Peter C. Hung, Seán F. McLoone, Magdalena S...
MOBICOM
2009
ACM
15 years 4 months ago
Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links
Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has ...
Shuo Guo, Yu Gu, Bo Jiang, Tian He
BMCBI
2010
160views more  BMCBI 2010»
14 years 10 months ago
Identification of functional hubs and modules by converting interactome networks into hierarchical ordering of proteins
Background: Protein-protein interactions play a key role in biological processes of proteins within a cell. Recent high-throughput techniques have generated protein-protein intera...
Young-Rae Cho, Aidong Zhang
HICSS
2007
IEEE
156views Biometrics» more  HICSS 2007»
15 years 4 months ago
KnowFlow - A Hybrid Approach to Identifying and Visualizing Distributed Knowledge Work Practices
Understanding collaborative work practices represents a critical factor in and a necessary fundament for the development of effective Computer Supported Collaborative Work (CSCW) ...
Markus Strohmaier, Stefanie N. Lindstaedt