Sciweavers

3441 search results - page 623 / 689
» Provenance of Software Development Processes
Sort
View
91
Voted
ICWMC
2006
IEEE
15 years 6 months ago
Power Characterization of a Bluetooth-based Wireless Node for Ubiquitous Computing
Abstract— Ubiquitous computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user. To furt...
Juan-Carlos Cano, José-Manuel Cano, Eva Gon...
101
Voted
IEEEARES
2006
IEEE
15 years 6 months ago
Securing DNS Services through System Self Cleansing and Hardware Enhancements
-- Domain Name Systems (DNS) provide the mapping between easily-remembered host names and their IP addresses. Popular DNS implementations however contain vulnerabilities that are e...
Yih Huang, David Arsenault, Arun Sood
99
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
101
Voted
IPPS
2006
IEEE
15 years 6 months ago
On-the-fly kernel updates for high-performance computing clusters
High-performance computing clusters running longlived tasks currently cannot have kernel software updates applied to them without causing system downtime. These clusters miss oppo...
Kristis Makris, Kyung Dong Ryu
87
Voted
HICSS
2005
IEEE
157views Biometrics» more  HICSS 2005»
15 years 6 months ago
Integration Technology Adoption in Healthcare Organisations: A Case for Enterprise Application Integration
A continuous technological innovation in software has brought development in integration technologies that promise the real time enterprise-wide systems integration. Healthcare or...
Khalil Khoumbati, Marinos Themistocleous, Zahir Ir...