Sciweavers

1596 search results - page 89 / 320
» Using knowledge nodes for knowledge discovery and collaborat...
Sort
View
OSDI
2008
ACM
15 years 11 months ago
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions
Abstract ? Large enterprise networks consist of thousands of services and applications. The performance and reliability of any particular application may depend on multiple service...
Xu Chen, Ming Zhang, Zhuoqing Morley Mao, Paramvir...
72
Voted
LCN
2007
IEEE
15 years 5 months ago
Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs
Abstract— Black Hole Attacks are a serious threat to communication in tactical MANETs. In this work we present TOGBAD a new centralised approach, using topology graphs to identif...
Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Ma...
ICMT
2010
Springer
14 years 9 months ago
Implementing Business Process Recovery Patterns through QVT Transformations
Traditionally, software maintenance takes only technical information into account to evolve legacy systems. However, business knowledge, which could help to improve the comprehensi...
Ricardo Pérez-Castillo, Ignacio Garcí...
GCC
2003
Springer
15 years 4 months ago
SemanticPeer: An Ontology-Based P2P Lookup Service
Locating content efficiently and conveniently is the key issue in P2P systems. In this paper we present SemanticPeer, an Ontology-Based P2P lookup service, to address this problem,...
Jing Tian, Yafei Dai, Xiaoming Li
IJNSEC
2008
175views more  IJNSEC 2008»
14 years 11 months ago
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
A location-aware scheme uses a priori knowledge of the deployed sensor nodes of some target field in a sensor network. Such location-aware schemes improve substantially higher net...
Ashok Kumar Das