Sciweavers

2045 search results - page 306 / 409
» The open network laboratory
Sort
View
98
Voted
ISSE
2006
15 years 20 days ago
Modeling security as a dependability attribute: a refinement-based approach
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
117
Voted
JNCA
2007
126views more  JNCA 2007»
15 years 17 days ago
Usage derived recommendations for a video digital library
We describe a minimalist methodology to develop usage-based recommender systems for multimedia digital libraries. A prototype recommender system based on this strategy was impleme...
Johan Bollen, Michael L. Nelson, Gary Geisler, Raq...
80
Voted
JUCS
2007
108views more  JUCS 2007»
15 years 17 days ago
Integrating Module Checking and Deduction in a Formal Proof for the Perlman Spanning Tree Protocol (STP)
: In the IEEE 802.1D standard for the Media Access Control layer (MAC layer) bridges, there is an STP (Spanning Tree Protocol) definition, based on the algorithm that was proposed...
Hossein Hojjat, Hootan Nakhost, Marjan Sirjani
102
Voted
PVLDB
2008
110views more  PVLDB 2008»
15 years 5 days ago
DObjects: enabling distributed data services for metacomputing platforms
Many applications rely heavily on large amounts of data in the distributed storages collected over time or produced by large scale scientific experiments or simulations. The key co...
Pawel Jurczyk, Li Xiong
95
Voted
SMC
2010
IEEE
159views Control Systems» more  SMC 2010»
14 years 11 months ago
Mobile interaction with smart environments through linked data
This paper presents the design and architecture of an integrated environment that provides location independent and mobile access to Intelligent Domotic Environments. The envision...
Faisal Razzak, Dario Bonino, Fulvio Corno