Sciweavers

3031 search results - page 391 / 607
» SNMS - Shadow Network Management System
Sort
View
CIKM
2008
Springer
15 years 6 months ago
Using tag semantic network for keyphrase extraction in blogs
Folksonomies provide a comfortable way to search and browse the blogosphere. As the tags in the blogosphere are sparse, ambiguous and too general, this paper proposes both a super...
Lizhen Qu, Christof Müller, Iryna Gurevych
ITICSE
2010
ACM
15 years 4 months ago
Hands-on approach to teaching wireless sensor networks at the undergraduate level
Teaching wireless sensor networks (WSNs) at the undergraduate level is both challenging and rewarding. WSNs include low-level programming and debugging, power-aware operations, no...
Anna Förster, Mehdi Jazayeri
USENIX
1994
15 years 5 months ago
Experiences with a Survey Tool for Discovering Network Time Protocol Servers
The Network Time Protocol (NTP) is widely used to synchronize computer clocks throughout the Internet. Existing NTP clients and servers form a very large distributed system, and y...
James D. Guyton, Michael F. Schwartz
DSN
2004
IEEE
15 years 8 months ago
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traffic over IP networks. As the popularity of VoIP systems increases, they are bei...
Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Si...
PDPTA
1997
15 years 5 months ago
Hazard-Free Connection Release
Abstract Fault-tolerant communication in a distributed system requires reliable connection management and message delivery. Reliable connection management includes the guarantee of...
Jennifer E. Walter, Jennifer L. Welch