Sciweavers

3031 search results - page 478 / 607
» SNMS - Shadow Network Management System
Sort
View
136
Voted
ACSAC
2006
IEEE
15 years 7 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
148
Voted
GRID
2006
Springer
15 years 3 months ago
Applying Peer-to-Peer Techniques to Grid Replica Location Services
Peer-to-peer systems offer attractive system management properties, including the ability of components that join the network to self-organize; scalability up to tens of thousands...
Ann L. Chervenak, Min Cai
154
Voted
CN
2008
127views more  CN 2008»
15 years 3 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
GIS
2009
ACM
15 years 7 months ago
Dynamic network data exploration through semi-supervised functional embedding
The paper presents a framework for semi-supervised nonlinear embedding methods useful for exploratory analysis and visualization of spatio-temporal network data. The method provid...
Alexei Pozdnoukhov
148
Voted
COMSWARE
2006
IEEE
15 years 7 months ago
M2MC: Middleware for many to many communication over broadcast networks
M2MC is a new distributed computing middleware designed to support collaborative applications running on devices connected by broadcast networks. Examples of such networks are wire...
Chaitanya Krishna Bhavanasi, Sridhar Iyer