Sciweavers

3031 search results - page 101 / 607
» SNMS - Shadow Network Management System
Sort
View
125
Voted
OSDI
2002
ACM
16 years 3 months ago
Integrated Resource Management for Cluster-based Internet Services
Client request rates for Internet services tend to be bursty and thus it is important to maintain efficient resource utilization under a wide range of load conditions. Network ser...
Kai Shen, Hong Tang, Tao Yang, Lingkun Chu
125
Voted
SASO
2007
IEEE
15 years 10 months ago
Towards Supporting Interactions between Self-Managed Cells
Management in pervasive systems cannot rely on human intervention or centralised decision-making functions. It must be devolved, based on local decision-making and feedback contro...
Alberto E. Schaeffer Filho, Emil C. Lupu, Naranker...
162
Voted
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
15 years 9 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha
149
Voted
KES
2004
Springer
15 years 9 months ago
A Collaborative Multi-agent Based Workflow System
Agent based workflow systems are being discussed by many researchers for a long time. In this paper we present a new collaborative approach for workflow systems. Agents collaborate...
Bastin Tony Roy Savarimuthu, Maryam Purvis
133
Voted
WMASH
2004
ACM
15 years 9 months ago
Proximity services supporting network virtual memory in mobile devices
Wireless networked embedded terminals like personal digital assistants, cell-phones or sensor nodes are typically memory constrained devices. This limitation prevents the developm...
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bo...