Sciweavers

738 search results - page 67 / 148
» Comparison of Approaches to Service Deployment
Sort
View
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
14 years 3 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
AAAI
2007
13 years 11 months ago
Biomind ArrayGenius and GeneGenius: Web Services Offering Microarray and SNP Data Analysis via Novel Machine Learning Methods
Analysis of postgenomic biological data (such as microarray and SNP data) is a subtle art and science, and the statistical methods most commonly utilized sometimes prove inadequat...
Ben Goertzel, Cassio Pennachin, Lúcio de So...
PERCOM
2011
ACM
13 years 15 days ago
RegReS: Adaptively maintaining a target density of regional services in opportunistic vehicular networks
Abstract—Pervasive vehicle-mounted mobile devices are increasingly common, and can be viewed as a large-scale ad hoc network on which collaborative, location-based services can b...
Emmanouil Koukoumidis, Li-Shiuan Peh, Margaret Mar...
HPDC
2010
IEEE
13 years 9 months ago
Software architecture definition for on-demand cloud provisioning
Cloud computing [22] is a promising paradigm for the provisioning of IT services. Cloud computing infrastructures, such as those offered by the RESERVOIR project, aim to facilitat...
Clovis Chapman, Wolfgang Emmerich, Fermín G...
SCN
2008
Springer
140views Communications» more  SCN 2008»
13 years 8 months ago
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)
The Multimedia Broadcast Multicast Service (MBMS) has been included in the 3GGP architecture to provide broadcast/multicast services. In the 3GPP Long Term Evolution, the evolved M...
Simone Teofili, Michele Di Mascolo, Cristina Basil...