Sciweavers

2145 search results - page 322 / 429
» Architectural Specifications in CASL
Sort
View
ICN
2005
Springer
14 years 3 months ago
Efficient Prioritized Service Recovery Using Content-Aware Routing Mechanism in Web Server Cluster
In the future, many more people will use web service in Ubiquitous environments. SMD-cluster, which is one of previous research, is a proposed scalable cluster system to meet the c...
Euisuk Kang, Sook-Heon Lee, Myong-Soon Park
IDEAL
2005
Springer
14 years 3 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
OTM
2005
Springer
14 years 3 months ago
Security Ontology for Annotating Resources
Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ...
Anya Kim, Jim Luo, Myong H. Kang
SAMOS
2005
Springer
14 years 3 months ago
Sandbridge Software Tools
—We describe the generation of the simulation environment for the Sandbridge Sandblaster multithreaded processor. The processor model is described using the Sandblaster architect...
C. John Glossner, Sean Dorward, Sanjay Jinturkar, ...
DOCENG
2004
ACM
14 years 3 months ago
Supporting virtual documents in just-in-time hypermedia systems
Many analytical or computational applications, especially legacy systems, create documents and display screens in response to user queries “dynamically” or in “real time”....
Li Zhang, Michael P. Bieber, David E. Millard, Vin...