We provide precise high-level models for eight fundamental service interaction patterns, together with schemes for their composition into complex service-based business process int...
In this paper, we study traffic demands in an IP bacbkone, identify the routes used by these demands, and evaluate traffic granularity levels that are attractive for improving the...
—Collecting per-flow aggregates in high-speed links is challenging and usually requires traffic sampling to handle peak rates and extreme traffic mixes. Static selection of sa...
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
The main focus of this paper is demonstrating a methodology for capturing and designing co-operative work processes. We present a method, appropriate for group work analysis, and ...