Sciweavers

571 search results - page 72 / 115
» From Control Flow to Dataflow
Sort
View
COMCOM
2004
102views more  COMCOM 2004»
13 years 8 months ago
A scalable architecture for end-to-end QoS provisioning
The Differentiated Services (DiffServ) architecture has been proposed by the Internet Engineering Task Force as a scalable solution for providing end-to-end Quality of Service (Qo...
Spiridon Bakiras, Victor O. K. Li
CINQ
2004
Springer
182views Database» more  CINQ 2004»
14 years 13 days ago
Mining Constrained Graphs: The Case of Workflow Systems
Abstract. Constrained graphs are directed graphs describing the control flow of processes models. In such graphs, nodes represent activities involved in the process, and edges the ...
Gianluigi Greco, Antonella Guzzo, Giuseppe Manco, ...
ACL
1997
13 years 10 months ago
An Algorithm for Generating Referential Descriptions with Flexible Interfaces
Most algorithms dedicated to the generation of referential descriptions widely suffer from a fundamental problem: they make too strong assumptions about adjacent processing compon...
Helmut Horacek
ENTCS
2006
90views more  ENTCS 2006»
13 years 8 months ago
A Framework for Engineering Interactions in Java-based Component Systems
This paper describes a Java-based framework for the development of componentbased software systems supporting the specification of the logic of component interactions as a first-c...
Antonio Natali, Enrico Oliva, Alessandro Ricci, Mi...
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
14 years 3 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...