Sciweavers

195 search results - page 30 / 39
» Hiding the complexity of LBS
Sort
View
TON
1998
112views more  TON 1998»
13 years 7 months ago
IP switching - ATM under IP
IP traffic on the Internet and private enterprise networks has been growing exponentially for some time. This growth is beginning to stress the traditional, processor based design...
Peter Newman, Greg Minshall, Thomas L. Lyon
IEEECIT
2010
IEEE
13 years 6 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
MIDDLEWARE
2010
Springer
13 years 6 months ago
Automatically Generating Symbolic Prefetches for Distributed Transactional Memories
Abstract. Developing efficient distributed applications while managing complexity can be challenging. Managing network latency is a key challenge for distributed applications. We ...
Alokika Dash, Brian Demsky
ENTCS
2010
118views more  ENTCS 2010»
13 years 5 months ago
Systematic Refinement of Performance Models for Concurrent Component-based Systems
Model-driven performance prediction methods require detailed design models to evaluate the performance of software systems during early development stages. However, the complexity...
Lucia Kapová, Steffen Becker
PE
2010
Springer
124views Optimization» more  PE 2010»
13 years 2 months ago
High-level approach to modeling of observed system behavior
Current computer systems and communication networks tend to be highly complex, and they typically hide their internal structure from their users. Thus, for selected aspects of cap...
Thomas Begin, Alexandre Brandwajn, Bruno Baynat, B...