Sciweavers

533 search results - page 65 / 107
» Control flow based obfuscation
Sort
View
139
Voted
ESIAT
2009
IEEE
15 years 11 days ago
Research and Realization of Geospatial Information Service Orchestration Based on BPEL
Geospatial information services composition is a promising approach to construct complex Web GIS applications. BPEL, which is the language and the industry standard that expresses ...
Xiaoliang Meng, Fuling Bian, Yichun Xie
IJITWE
2010
118views more  IJITWE 2010»
14 years 12 months ago
Critical Path Based Approach for Predicting Temporal Exceptions in Resource Constrained Concurrent Workflows
Departmental workflows within a digital business ecosystem are often executed concurrently and required to share limited number of resources. However, unexpected events from the b...
Iok-Fai Leong, Yain-Whar Si, Robert P. Biuk-Aghai
133
Voted
WCET
2008
15 years 4 months ago
INFER: Interactive Timing Profiles based on Bayesian Networks
We propose an approach for timing analysis of software-based embedded computer systems that builds on the established probabilistic framework of Bayesian networks. We envision an ...
Michael Zolda
131
Voted
JSS
2006
104views more  JSS 2006»
15 years 2 months ago
Modelling and simulation of off-chip communication architectures for high-speed packet processors
In this work, we propose a visual, custom-designed, event-driven interconnect simulation framework to evaluate the performance of off-chip multi-processor/memory communications ar...
Jacob Engel, Daniel Lacks, Taskin Koçak
101
Voted
JDCTA
2010
172views more  JDCTA 2010»
14 years 9 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh