Sciweavers

283 search results - page 44 / 57
» Strategies to Minimize Problems in Global Requirements Elici...
Sort
View
CSCW
2004
ACM
15 years 5 months ago
Lilsys: Sensing Unavailability
As communications systems increasingly gather and propagate information about people’s reachability or “presence”, users need better tools to minimize undesired interruption...
James Begole, Nicholas E. Matsakis, John C. Tang
MSWIM
2004
ACM
15 years 5 months ago
Modeling wireless shadow networks
In case of natural disasters or intentional attacks, telecommunication networks often get heavily damaged and current resilience schemes have proven to be insufficient for rapid r...
Filip De Turck, Aurel A. Lazar
FMICS
2006
Springer
15 years 3 months ago
"To Store or Not To Store" Reloaded: Reclaiming Memory on Demand
Behrmann et al. posed the question whether "To Store or Not To Store" [1] states during reachability analysis, in order to counter the effects of the well-known state spa...
Moritz Hammer, Michael Weber
JSAC
2006
128views more  JSAC 2006»
14 years 11 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
SAC
2008
ACM
14 years 11 months ago
A lifecycle approach to SOA governance
Due to the distributed nature of Service-Oriented Architectures (SOA), maintaining control in a SOA environment becomes more difficult as services spread over different lines-of-b...
T. G. J. Schepers, Maria-Eugenia Iacob, Pascal van...