Sciweavers

483 search results - page 33 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
IASTEDSE
2004
15 years 4 months ago
Service specification with MSCs and roles
The notion of service enjoys increasing popularity as a means for structuring complex distributed systems. Most definitions of the term service, however, refer only to syntactic l...
Ingolf H. Krüger
PERCOM
2006
ACM
16 years 3 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
CODES
2008
IEEE
15 years 10 months ago
A security monitoring service for NoCs
As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-onChip (...
Leandro Fiorin, Gianluca Palermo, Cristina Silvano
IJNSEC
2006
80views more  IJNSEC 2006»
15 years 3 months ago
Authenticated Access to Reserved Network Resources
Enhanced network services often involve preferential allocation of resources such as transmission capacity ("bandwidth") and buffer space to packets belonging to certain...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...
CCGRID
2006
IEEE
15 years 7 months ago
An Ontology-Based Conceptual Mapping Framework for Translating FBPML to the Web Services Ontology
This paper presents an ontology-based conceptual mapping framework that translates a formal and visually rich business process modeling (BPM) language, Fundamental Business Proces...
Gayathri Nadarajan, Yun-Heh Chen-Burger