Sciweavers

970 search results - page 100 / 194
» A comprehensive analysis of hyper-heuristics
Sort
View
IEEESCC
2008
IEEE
14 years 2 months ago
Byzantine Fault Tolerant Coordination for Web Services Business Activities
In this paper, we present a comprehensive study on the threats towards the coordination services for Web services business activities and explore the most optimal solution to miti...
Wenbing Zhao, Honglei Zhang
INFOCOM
2008
IEEE
14 years 2 months ago
On Maintaining Sensor-Actor Connectivity in Wireless Sensor and Actor Networks
—In wireless sensor and actor networks (WSANs), a group of sensors and actors are connected by a wireless medium to perform distributed sensing and acting tasks. Sensors usually ...
Jie Wu, Shuhui Yang, Mihaela Cardei
SAINT
2008
IEEE
14 years 2 months ago
Performance Measurements and Statistics of Tor Hidden Services
Tor (The Onion Routing) provides a secure mechanism for offering TCP-based services while concealing the hidden server’s IP address. In general the acceptance of services strong...
Karsten Loesing, Werner Sandmann, Christian Wilms,...
WCRE
2008
IEEE
14 years 2 months ago
Pitfalls in Aspect Mining
The research domain of aspect mining studies the problem of (semi-)automatically identifying potential aspects and crosscutting concerns in a software system, to improve the syste...
Kim Mens, Andy Kellens, Jens Krinke
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 2 months ago
Exploring the Local Connectivity Preference in Internet AS Level Topology
—The Internet AS level topology, upon which BGP4 runs, plays a vital role in the analysis and study of the global routing behavior. However, the study of the topology itself is n...
Guoqiang Zhang, Guoqing Zhang