Sciweavers

7103 search results - page 1143 / 1421
» Program Generation and Components
Sort
View
IEEECIT
2010
IEEE
15 years 2 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
136
Voted
INCDM
2010
Springer
172views Data Mining» more  INCDM 2010»
15 years 2 months ago
Evaluating the Quality of Clustering Algorithms Using Cluster Path Lengths
Many real world systems can be modeled as networks or graphs. Clustering algorithms that help us to organize and understand these networks are usually referred to as, graph based c...
Faraz Zaidi, Daniel Archambault, Guy Melanç...
MIDDLEWARE
2010
Springer
15 years 2 months ago
Anonygator: Privacy and Integrity Preserving Data Aggregation
Abstract. Data aggregation is a key aspect of many distributed applications, such as distributed sensing, performance monitoring, and distributed diagnostics. In such settings, use...
Krishna P. N. Puttaswamy, Ranjita Bhagwan, Venkata...
MODELS
2010
Springer
15 years 2 months ago
Automatically Discovering Properties That Specify the Latent Behavior of UML Models
Formal analysis can be used to verify that a model of the system adheres to its requirements. As such, traditional formal analysis focuses on whether known (desired) system propert...
Heather Goldsby, Betty H. C. Cheng
PERCOM
2010
ACM
15 years 2 months ago
Towards the Web of Things: Using DPWS to bridge isolated OSGi platforms
Abstract—Bringing heterogeneous devices like industrial machines, home appliances, and wireless sensors into the Web assumes the usage of well-defined standards and protocols. O...
Oliver Dohndorf, Jan Krüger, Heiko Krumm, Chr...
« Prev « First page 1143 / 1421 Last » Next »