Sciweavers

3341 search results - page 523 / 669
» A Communication Virtual Machine
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 4 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 4 months ago
A Session-Initiation-Protocol-Based Middleware for Multi-Application Management
Abstract—The deployment of multimedia services in nextgeneration networks is a challenge due to the high configuration complexity of the streaming process in different stationary...
Teodora Guenkova-Luy, Holger Schmidt, Andreas Scho...
NCA
2007
IEEE
14 years 3 months ago
Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems
Open distributed systems are typically composed by an unknown number of processes running in heterogeneous hosts. Their communication often requires tolerance to temporary disconn...
Alysson Neves Bessani, Miguel Correia, Joni da Sil...
MIDDLEWARE
2007
Springer
14 years 3 months ago
Wireless ad hoc VoIP
VoIP is one of the traditional application scenarios for Mobile Ad Hoc Networks (MANETs) in settings such as emergency response. Ideally, VoIP would be transparent to the network ...
Patrick Stuedi, Gustavo Alonso
AICT
2006
IEEE
210views Communications» more  AICT 2006»
14 years 3 months ago
Model-Based Analysis of Obligations in Web Service Choreography
In this paper we discuss a model-based approach to the analysis of service interactions for coordinated web service compositions using obligation policies specified in the form of...
Howard Foster, Sebastián Uchitel, Jeff Mage...