Sciweavers

998 search results - page 128 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
CONEXT
2006
ACM
14 years 1 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
ECTEL
2006
Springer
14 years 1 months ago
Interoperability for Peer-to-Peer Networks: Opening P2P to the Rest of the World
Due to the information growth, distributed environments are offered as a feasible and scalable solution where Peerto-Peer networks have become more relevant. They bring many advan...
Ingo Brunkhorst, Daniel Olmedilla
EURONGI
2006
Springer
14 years 1 months ago
Joint Connection and Packet Level Analysis in W-CDMA Radio Interface
Abstract. This work introduces a new analytical method for performance evaluation of wireless packet-oriented networks. Unlike traditional call admission control procedures commonl...
Vilius Benetis, Larissa Popova, Villy Bæk Iv...
CCGRID
2001
IEEE
14 years 1 months ago
Early Experiences with the EGrid Testbed
The Testbed and Applications working group of the European Grid Forum (EGrid) is actively building and experimenting with a grid infrastructure connecting several research-based s...
Gabrielle Allen, Thomas Dramlitsch, Tom Goodale, G...
EDBT
2000
ACM
14 years 1 months ago
Performance and Availability Assessment for the Configuration of Distributed Workflow Management Systems
Workflow management systems (WFMSs) that are geared for the orchestration of enterprise-wide or even "virtual-enterprise"-style business processes across multiple organi...
Michael Gillmann, Jeanine Weißenfels, Gerhar...