Sciweavers

353 search results - page 67 / 71
» Linking UML Models of Design and Requirement
Sort
View
ANSS
2008
IEEE
14 years 2 months ago
Simulation of Buffer Management Policies in Networks for Grids
Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of resources that are geographically distributed across different location...
Agustín C. Caminero, Anthony Sulistio, Blan...
IAT
2007
IEEE
14 years 2 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
SAC
2009
ACM
14 years 2 months ago
Applying Reo to service coordination in long-running business transactions
Ensuring transactional behavior of business processes and web service compositions is an essential issue in the area of serviceoriented computing. Transactions in this context may ...
Natallia Kokash, Farhad Arbab
IPPS
1998
IEEE
13 years 12 months ago
Migration and Rollback Transparency for Arbitrary Distributed Applications in Workstation Clusters
Programmers and users of compute intensive scientific applications often do not want to (or even cannot) code load balancing and fault tolerance into their programs. The PBEAM syst...
Stefan Petri, Matthias Bolz, Horst Langendörf...
CN
2010
134views more  CN 2010»
13 years 6 months ago
TCP Libra: Derivation, analysis, and comparison with other RTT-fair TCPs
— The Transmission Control Protocol (TCP), the most widely used transport protocol over the Internet, has been advertised to implement fairness between flows competing for the s...
Gustavo Marfia, Claudio E. Palazzi, Giovanni Pau, ...