Sciweavers

706 search results - page 97 / 142
» Clone-Aware Configuration Management
Sort
View
JHSN
2006
95views more  JHSN 2006»
13 years 10 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
TON
2008
160views more  TON 2008»
13 years 10 months ago
Label space reduction in MPLS networks: how much can a single stacked label do?
Most network operators have considered reducing LSR label spaces (number of labels used) as a way of simplifying management of underlaying Virtual Private Networks (VPNs) and there...
Fernando Solano, Thomas Stidsen, Ramón Fabr...
TSE
2008
129views more  TSE 2008»
13 years 10 months ago
Classifying Software Changes: Clean or Buggy?
This paper introduces a new technique for predicting latent software bugs, called change classification. Change classification uses a machine learning classifier to determine wheth...
Sunghun Kim, E. James Whitehead Jr., Yi Zhang 0001
DEBU
2000
147views more  DEBU 2000»
13 years 10 months ago
Adaptive Query Processing for Internet Applications
As the area of data management for the Internet has gained in popularity, recent work has focused on effectively dealing with unpredictable, dynamic data volumes and transfer rate...
Zachary G. Ives, Alon Y. Levy, Daniel S. Weld, Dan...
ICSOC
2010
Springer
13 years 9 months ago
BPEL4Pegasus: Combining Business and Scientific Workflows
Business and scientific workflow management systems (WfMS) offer different features to their users because they are developed for different application areas with different require...
Mirko Sonntag, Dimka Karastoyanova, Ewa Deelman