Sciweavers

8647 search results - page 1453 / 1730
» The Container Selection Problem
Sort
View
137
Voted
ACSAC
2002
IEEE
15 years 8 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
102
Voted
EDOC
2002
IEEE
15 years 8 months ago
An Architecture and a Process for Implementing Distributed Collaborations
Collaborations (between objects) are increasingly being recognized as fundamental building blocks to structure object-oriented design, and they have made their way into UML. But v...
Eric Cariou, Antoine Beugnard, Jean-Marc Jé...
HICSS
2002
IEEE
79views Biometrics» more  HICSS 2002»
15 years 8 months ago
Managerial Openness and the Adoption of Distributed Group Support Systems: The Case of WebWide Participation
The problem of total participation in asynchronous meetings convened with distributed group support systems has been noted frequently but investigated rarely. This paper describes...
John Rhorbaugh
HPDC
2002
IEEE
15 years 8 months ago
Predicting Sporadic Grid Data Transfers
The increasingly common practice of replicating datasets and using resources as distributed data stores in Grid environments has led to the problem of determining which replica ca...
Sudharshan Vazhkudai, Jennifer M. Schopf
ICNP
2002
IEEE
15 years 8 months ago
Incentive Engineering in Wireless LAN Based Access Networks
Traffic regulation in public and private wireless LANs face a number of significant challenges, particularly in commercial networks where there is a need for efficient regulati...
Raymond R.-F. Liao, Rita H. Wouhaybi, Andrew T. Ca...
« Prev « First page 1453 / 1730 Last » Next »