Service discovery

Results: 867



#Item
101Distributed computing architecture / Autonomic computing / Self-management / Grid computing / Service-oriented architecture / IBM / Service discovery / Autonomic networking / Artificial intelligence / Computing / Information technology management

Grant Agreement N° Title: Use Case Description and State-of-the-Art

Add to Reading List

Source URL: www.s-cube-network.eu

Language: English - Date: 2009-05-19 04:12:15
102Television / Discovery HD / IO Digital Cable Service / High-definition television in the United States / High-definition television / Electronic engineering / Satellite television

Channel Lineup BIRMINGHAM september 2014 standard channels [continued]

Add to Reading List

Source URL: businesssolutions.brighthouse.com

Language: English - Date: 2015-06-05 09:27:40
103High-definition television in the United States / Discovery HD / Electronics / IO Digital Cable Service / High-definition television / Electronic engineering / Television

CHANNEL LINEUP Michigan august 2014 basic channels 2 WJBK-TV FOX

Add to Reading List

Source URL: businesssolutions.brighthouse.com

Language: English - Date: 2015-06-05 18:56:01
104Discovery Channel / Religion / Indian people / Culture / Deepak Chopra / Spiritualists / Chopra

FOR IMMEDIATE RELEASE: MARCH 18, 2015: NEWSWIRE.FM & Martine Dubin Company announce the launch of a brand new distribution partnership with www.CuriosityStream.com . The new SVOD service focused on factual programming wi

Add to Reading List

Source URL: newswire.fm

Language: English - Date: 2015-03-18 08:50:23
105Data quality / Information science / Business intelligence

Balancing the Demands for Business Agility with IT Governance and Control A Changing Paradigm The need for business agility and self-service analytics is changing the governance equation. Data discovery is upending the t

Add to Reading List

Source URL: www.lavastorm.com

Language: English - Date: 2015-03-30 15:34:05
106Telecommunications engineering / Technology / Denial-of-service attacks / Cyberwarfare / Channel access methods / Frequency-hopping spread spectrum / Spread spectrum / Communications jamming / Direct-sequence spread spectrum / OSI protocols / Multiplexing / Radio resource management

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University, Raleigh, NC 27695 {aliu3, pning, huaiyu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:11
107Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
108Public-key cryptography / ANT / Sensor node / Telecommunications engineering / Wireless sensor network / Technology / Computing

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG NING North Carolina State University Broadcast authentication is a fundamental security service in distributed sensor n

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:17
109Directory information tree / Hierarchy / Directory service / Computer security / Database / E-Government / Structure / Identity management / Identity / Computing

World Leading Discovery Technology White Paper: Machinery of Government Identity Management and XML Directory Services Solutions

Add to Reading List

Source URL: www.viewds.com

Language: English - Date: 2015-03-12 01:01:21
110Denial-of-service attack / Computing / Computer network security / Alert correlation / Alert messaging

Constructing Attack Scenarios through Correlation of Intrusion Alerts Peng Ning Yun Cui

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:01
UPDATE