Sciweavers

366 search results - page 72 / 74
» Fremont: A System for Discovering Network Characteristics an...
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 7 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
ACSW
2006
13 years 9 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
NOSSDAV
1991
Springer
13 years 11 months ago
Multimedia Synchronization and UNIX
One of the most important emerging developments for improving the user/computer interface has been the addition of multimedia facilities to high-performance workstations. Although...
Dick C. A. Bulterman, Robert van Liere
ER
2007
Springer
190views Database» more  ER 2007»
14 years 1 months ago
The CIDOC Conceptual Reference Model - A New Standard for Knowledge Sharing
The tutorial first addresses requirements and semantic problems to integrate digital information into large scale, meaningful networks of knowledge that support not only access to...
Martin Doerr, Christian-Emil Ore, Stephen Stead
SIGMETRICS
2005
ACM
150views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
An analytical model for multi-tier internet services and its applications
- Since many Web applications employ a multi-tier architecture, in this paper, we focus on the problem of analytically modeling the behavior of such applications. We present a mode...
Bhuvan Urgaonkar, Giovanni Pacifici, Prashant J. S...