Sciweavers

5790 search results - page 1061 / 1158
» Distributed programming with distributed authorization
Sort
View
CCR
2004
151views more  CCR 2004»
13 years 9 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
CLASSIFICATION
2004
59views more  CLASSIFICATION 2004»
13 years 9 months ago
Oscillation Heuristics for the Two-group Classification Problem
: We propose a new nonparametric family of oscillation heuristics for improving linear classifiers in the two-group discriminant problem. The heuristics are motivated by the intuit...
Ognian Asparouhov, Paul A. Rubin
CORR
2004
Springer
146views Education» more  CORR 2004»
13 years 9 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham
CCR
2002
72views more  CCR 2002»
13 years 9 months ago
Multicast Video-on-Demand services
The server's storage I/O and network I/O bandwidths are the main bottleneck of VoD service. Multicast offers an efficient means of distributing a video program to multiple cl...
Huadong Ma, Kang G. Shin
CSUR
2000
78views more  CSUR 2000»
13 years 9 months ago
Developing flexible and high-performance Web servers with frameworks and patterns
The goal of this paper is to illustrate how frameworks and patterns address complexities that arise in the design and implementation of high-performance distributed software syste...
Douglas C. Schmidt, James C. Hu
« Prev « First page 1061 / 1158 Last » Next »