Sciweavers

5548 search results - page 999 / 1110
» Programming a Distributed System Using Shared Objects
Sort
View
134
Voted
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
15 years 9 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
153
Voted
FGCS
2006
111views more  FGCS 2006»
15 years 4 months ago
Collaborative data visualization for Earth Sciences with the OptIPuter
Collaborative visualization of large-scale datasets across geographically distributed sites is becoming increasingly important for Earth Sciences. Not only does it enhance our und...
Nut Taesombut, Xinran (Ryan) Wu, Andrew A. Chien, ...
MOBICOM
2004
ACM
15 years 10 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra
CLUSTER
2005
IEEE
15 years 10 months ago
Search-based Job Scheduling for Parallel Computer Workloads
To balance performance goals and allow administrators to declaratively specify high-level performance goals, we apply complete search algorithms to design on-line job scheduling p...
Sangsuree Vasupongayya, Su-Hui Chiang, B. Massey
145
Voted
DEON
2008
Springer
15 years 6 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...