Sciweavers

2421 search results - page 184 / 485
» Message from the Co-Chairs
Sort
View
BNCOD
2006
69views Database» more  BNCOD 2006»
13 years 11 months ago
Reducing Sub-transaction Aborts and Blocking Time Within Atomic Commit Protocols
Composed Web service transactions executed in distributed networks often require an atomic execution. Guaranteeing atomicity in mobile networks involves a lot more challenges than ...
Stefan Böttcher, Le Gruenwald, Sebastian Ober...
DAGSTUHL
2006
13 years 11 months ago
Denial of Service Protection with Beaver
We present Beaver, a method and architecture to "build dams" to protect servers from Denial of Service (DoS) attacks. Beaver allows efficient filtering of DoS traffic us...
Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Roma...
DATESO
2006
109views Database» more  DATESO 2006»
13 years 11 months ago
Compression of a Dictionary
Some text compression methods take advantage from using more complex compression units than characters. The synchronization between coder and decoder then can be done by transferri...
Jan Lansky, Michal Zemlicka
DGO
2003
92views Education» more  DGO 2003»
13 years 11 months ago
E-Government in the Arabian Gulf: A Vision toward Reality
This paper presents a review of the e-government initiatives in the Arabian Gulf countries that form the Gulf Cooperation Council, GCC. Throughout the region, extensive efforts ar...
George K. Kostopoulos
MASCOTS
1993
13 years 11 months ago
Simulation Modeling of Weak-Consistency Protocols
: Weak-consistency replication protocols can be used to build wide-area services that are scalable, fault-tolerant, and useful for mobile computer systems. We have evaluated the ti...
Richard A. Golding, Darrell D. E. Long