Sciweavers

186 search results - page 27 / 38
» Operational Characteristics of an Automated Intrusion Respon...
Sort
View
137
Voted
WINET
2010
178views more  WINET 2010»
14 years 8 months ago
Zero-configuration indoor localization over IEEE 802.11 wireless infrastructure
With the technical advances in ubiquitous computing and wireless networking, there has been an increasing need to capture the context information (such as the location) and to figu...
Hyuk Lim, Lu-Chuan Kung, Jennifer C. Hou, Haiyun L...
MICRO
2009
IEEE
144views Hardware» more  MICRO 2009»
15 years 8 months ago
Characterizing flash memory: anomalies, observations, and applications
Despite flash memory’s promise, it suffers from many idiosyncrasies such as limited durability, data integrity problems, and asymmetry in operation granularity. As architects, ...
Laura M. Grupp, Adrian M. Caulfield, Joel Coburn, ...
INFOCOM
2009
IEEE
15 years 8 months ago
apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates
—The Internet has become a cost-effective vehicle for software development and release, particular in the free software community. Given the free nature of this software, there a...
Cameron Dale, Jiangchuan Liu
DCOSS
2007
Springer
15 years 8 months ago
A Semantics-Based Middleware for Utilizing Heterogeneous Sensor Networks
With the proliferation of various kinds of sensor networks, we will see large amounts of heterogeneous data. They have different characteristics such as data content, formats, mod...
Eric Bouillet, Mark Feblowitz, Zhen Liu, Anand Ran...
ITNG
2008
IEEE
15 years 8 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson