Sciweavers

3031 search results - page 524 / 607
» SNMS - Shadow Network Management System
Sort
View
ADBIS
2004
Springer
147views Database» more  ADBIS 2004»
15 years 5 months ago
A Hybrid Keyword Search across Peer-to-Peer Federated Databases
The need for Keyword search in databases is suggested both by Web integration with legacy database management system and by dynamic Web publication. However, it sacrifices the inh...
Jungkee Kim, Geoffrey Fox
DSOM
2004
Springer
15 years 5 months ago
Using Object-Oriented Constraint Satisfaction for Automated Configuration Generation
In this paper, we describe an approach for automatically generating configurations for complex applications. Automated generation of system co nfigurations is required to allow lar...
Tim Hinrichs, Nathaniel Love, Charles J. Petrie, L...
ISER
2004
Springer
115views Robotics» more  ISER 2004»
15 years 5 months ago
Dynamic Virtual Fences for Controlling Cows
A virtual fence is created by applying an aversive stimulus to an animal when it approaches a predefined boundary. It is implemented by a small animal-borne computer system with a...
Zack J. Butler, Peter I. Corke, Ronald A. Peterson...
DISCEX
2003
IEEE
15 years 5 months ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
HICSS
2003
IEEE
119views Biometrics» more  HICSS 2003»
15 years 5 months ago
A First Person IP over HDSL Case Study
As many authors have articulated, the “last mile problem” is often cited as a persistent engineering obstacle in deploying residential broadband solutions. Additionally, some ...
Wayne Smith