Sciweavers

175 search results - page 29 / 35
» Behavioural Types for Service Integration: Achievements and ...
Sort
View
CCS
2007
ACM
14 years 2 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
VTC
2008
IEEE
173views Communications» more  VTC 2008»
14 years 2 months ago
A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks
Abstract—Cross-layer routing and scheduling algorithms design for wireless backhaul mesh network has attracted much research interest recently. The network is expected to support...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung
DASFAA
2007
IEEE
208views Database» more  DASFAA 2007»
14 years 2 months ago
Probabilistic Nearest-Neighbor Query on Uncertain Objects
Nearest-neighbor queries are an important query type for commonly used feature databases. In many different application areas, e.g. sensor databases, location based services or fac...
Hans-Peter Kriegel, Peter Kunath, Matthias Renz
BTW
2003
Springer
94views Database» more  BTW 2003»
14 years 1 months ago
The Paradigm of Relational Indexing: a Survey
Abstract: In order to achieve efficient execution plans for queries comprising userdefined data types and predicates, the database system has to be provided with appropriate index ...
Hans-Peter Kriegel, Martin Pfeifle, Marco Pöt...
ARTQOS
2003
Springer
14 years 1 days ago
Differentiation and Interaction of Traffic: A Flow Level Study
We study what kind of differentiation can be achieved using DiffServ without admission control and using a relative services approach, i.e. the rate of the flow should be in propor...
Eeva Nyberg, Samuli Aalto