Sciweavers

2135 search results - page 127 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
AINA
2010
IEEE
14 years 1 months ago
SAGE: An Approach to Evaluate the Impact of SOA Governance Policies
We propose SAGE (Service Oriented Architecture Governance Evaluation) as a quantitative approach, to evaluate the impact of SOA governance policies on prominent quality attributes...
Amit Sangroya, Kirti Garg, Vasudeva Varma
KES
2005
Springer
14 years 1 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
MST
2011
200views Hardware» more  MST 2011»
13 years 3 months ago
Performance of Scheduling Policies in Adversarial Networks with Non-synchronized Clocks
In this paper we generalize the Continuous Adversarial Queuing Theory (CAQT) model [5] by considering the possibility that the router clocks in the network are not synchronized. W...
Antonio Fernández Anta, José Luis L&...
DKE
2011
260views Education» more  DKE 2011»
12 years 11 months ago
Analysis on demand: Instantaneous soundness checking of industrial business process models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications, and...
Dirk Fahland, Cédric Favre, Jana Koehler, N...
ICMLA
2009
13 years 6 months ago
Learning Geographic Regions using Location Based Services in Next Generation Networks
Abstract--In this paper we apply classification to learn geographic regions using Location Based Services (LBS) in Next Generation Networks (NGN). We assume that the information in...
Yuheng He, Attila Bilgic