Sciweavers

738 search results - page 121 / 148
» Comparison of Approaches to Service Deployment
Sort
View
ICNP
2007
IEEE
14 years 3 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
HPCC
2007
Springer
14 years 2 months ago
DISH - Dynamic Information-Based Scalable Hashing on a Cluster of Web Cache Servers
Caching web pages is an important part of web infrastructure. The effects of caching services are even more pronounced for wireless infrastructures due to their limited bandwidth. ...
Andrew Sohn, Hukeun Kwak, Kyusik Chung
ISAS
2007
Springer
14 years 2 months ago
MDDPro: Model-Driven Dependability Provisioning in Enterprise Distributed Real-Time and Embedded Systems
Service oriented architecture (SOA) design principles are increasingly being adopted to develop distributed real-time and embedded (DRE) systems, such as avionics mission computin...
Sumant Tambe, Jaiganesh Balasubramanian, Aniruddha...
OTM
2007
Springer
14 years 2 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
OTM
2007
Springer
14 years 2 months ago
An Outlook on Semantic Business Process Mining and Monitoring
Semantic Business Process Management (SBPM) has been proposed as an extension of BPM with Semantic Web and Semantic Web Services (SWS) technologies in order to increase and enhance...
Ana Karla Alves de Medeiros, Carlos Pedrinaci, Wil...