Sciweavers

1067 search results - page 194 / 214
» Analysis of BPEL Data Dependencies
Sort
View
PTS
2007
120views Hardware» more  PTS 2007»
13 years 9 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
QUESTA
2006
94views more  QUESTA 2006»
13 years 7 months ago
Modeling teletraffic arrivals by a Poisson cluster process
In this paper we consider a Poisson cluster process N as a generating process for the arrivals of packets to a server. This process generalizes in a more realistic way the infinite...
Gilles Faÿ, Bárbara González-Ar...
NAR
1998
73views more  NAR 1998»
13 years 7 months ago
Identification and characterization of the RAD51 gene from the ciliate Tetrahymena thermophila
The RAD51 gene is a eukaryotic homolog of recA, a critical component in homologous recombination and DNA repair pathways in Escherichia coli. We have cloned the RAD51 homolog from...
Colin Campbell, Daniel P. Romero
IWCIA
2009
Springer
14 years 2 months ago
Signatures of Combinatorial Maps
Abstract. In this paper, we address the problem of computing a canonical representation of an n-dimensional combinatorial map. To do so, we define two combinatorial map signatures...
Stéphane Gosselin, Guillaume Damiand, Chris...
SIGCOMM
2009
ACM
14 years 2 months ago
Towards automated performance diagnosis in a large IPTV network
IPTV is increasingly being deployed and offered as a commercial service to residential broadband customers. Compared with traditional ISP networks, an IPTV distribution network (i...
Ajay Anil Mahimkar, Zihui Ge, Aman Shaikh, Jia Wan...