Sciweavers

3031 search results - page 541 / 607
» SNMS - Shadow Network Management System
Sort
View
KDD
2009
ACM
160views Data Mining» more  KDD 2009»
15 years 6 months ago
Clustering event logs using iterative partitioning
The importance of event logs, as a source of information in systems and network management cannot be overemphasized. With the ever increasing size and complexity of today’s even...
Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangel...
SEMWEB
2009
Springer
15 years 6 months ago
Produce and Consume Linked Data with Drupal!
Abstract. Currently a large number of Web sites are driven by Content Management Systems (CMS) which manage textual and multimedia content but also inherently - carry valuable info...
Stephane Corlosquet, Renaud Delbru, Tim Clark, Axe...
HPDC
2007
IEEE
15 years 6 months ago
Towards adaptive, scalable, and reliable resource provisioning for wsrf-compliant applications
Although WSRF (Web Services Resource Framework) and Java-based hosting environment have been successful in dealing with the heterogeneity of resources and the diversity of applica...
Eun-Kyu Byun, Jae-Wan Jang, Jin-Soo Kim
IEEESCC
2007
IEEE
15 years 6 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 6 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester