Sciweavers

721 search results - page 126 / 145
» A Logic-Based Access Control Approach For Web Services
Sort
View
CCS
2007
ACM
14 years 1 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
ICAC
2005
IEEE
14 years 1 months ago
Feedback-based Scheduling for Back-end Databases in Shared Dynamic Content Server Clusters
This paper introduces a self-configuring architecture for scaling the database tier of dynamic content web servers. We use a unified approach to load and fault management based ...
Gokul Soundararajan, Kaloian Manassiev, Jin Chen, ...
ITIIS
2008
151views more  ITIIS 2008»
13 years 7 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
WWW
2005
ACM
14 years 8 months ago
Hierarchical substring caching for efficient content distribution to low-bandwidth clients
While overall bandwidth in the internet has grown rapidly over the last few years, and an increasing number of clients enjoy broadband connectivity, many others still access the i...
Utku Irmak, Torsten Suel
LOBJET
2006
196views more  LOBJET 2006»
13 years 7 months ago
Mapping High-Level Business Rules To and Through Aspects
Many object-oriented software applications contain implicit business rules. Although there exist many approaches that advocate the separation of rules, the rules' connections ...
María Agustina Cibrán, Maja D'Hondt,...