Sciweavers

2940 search results - page 63 / 588
» Behavioral Constraints for Services
Sort
View
INFOCOM
2011
IEEE
13 years 2 months ago
Network-aware behavior clustering of Internet end hosts
Abstract—This paper explores the behavior similarity of Internet end hosts in the same network prefixes. We use bipartite graphs to model network traffic, and then construct on...
Kuai Xu, Feng Wang 0002, Lin Gu
ACSAC
2003
IEEE
14 years 3 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
MM
2009
ACM
147views Multimedia» more  MM 2009»
14 years 2 months ago
Wearing a YouTube hat: directors, comedians, gurus, and user aggregated behavior
While existing studies on YouTube’s massive user-generated video content have mostly focused on the analysis of videos, their characteristics, and network properties, little att...
Joan-Isaac Biel, Daniel Gatica-Perez
TOOLS
1999
IEEE
14 years 2 months ago
Bounding Component Behavior via Protocols
In this paper we enhance the SOFA Component Description Language with a semantic description of a component's functionality. There are two key requirements this description a...
Frantisek Plasil, Milos Besta, Stanislav Visnovsky
TOSEM
2010
168views more  TOSEM 2010»
13 years 5 months ago
Analysis and applications of timed service protocols
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted tha...
Julien Ponge, Boualem Benatallah, Fabio Casati, Fa...