Sciweavers

483 search results - page 70 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
ASMTA
2009
Springer
104views Mathematics» more  ASMTA 2009»
15 years 10 months ago
Preliminary Results on a Simple Approach to G/G/c-Like Queues
In this paper we consider a multi-server queue with a near general arrival process (represented as an arbitrary state-dependent Coxian distribution), a near general state-dependent...
Alexandre Brandwajn, Thomas Begin
136
Voted
SAC
2003
ACM
15 years 8 months ago
Semantic Matchmaking in a P-2-P Electronic Marketplace
Matchmaking is the problem of matching offers and requests, such as supply and demand in a marketplace, services and customers in a service agency, etc., where both partners are ...
Tommaso Di Noia, Eugenio Di Sciascio, Francesco M....
122
Voted
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 10 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
102
Voted
CN
2002
91views more  CN 2002»
15 years 3 months ago
Mapping of performance metrics between IP and ATM
End-to-end QoS requires mapping of QoS between heterogeneous subnetworks of the end-to-end path. For this mapping to be accurate, we argue, in this paper, that it should be based ...
Tijani Chahed, Gérard Hébuterne, Guy...
170
Voted
INFOSCALE
2009
ACM
15 years 10 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li