Sciweavers

6836 search results - page 1362 / 1368
» Modelling Web-Oriented Architectures
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 6 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
COMPUTER
2007
153views more  COMPUTER 2007»
13 years 6 months ago
The Discipline of Embedded Systems Design
ems, using abstractions that actually remove physical constraints from consideration. At the other, embedded systems design goes beyond the traditional expertise of electrical engi...
Thomas A. Henzinger, Joseph Sifakis
JSAC
2008
146views more  JSAC 2008»
13 years 6 months ago
On the Interaction and Competition among Internet Service Providers
The current Internet architecture comprises of different privately owned Internet service providers (ISPs) where higher tier ISPs supply connectivity service to lower tier ISPs an...
Sam C. M. Lee, John C. S. Lui
JSAC
2008
111views more  JSAC 2008»
13 years 6 months ago
The end-to-end rate control in multiple-hop wireless networks: Cross-layer formulation and optimal allocation
In this paper, we study the theoretical problem of the end-to-end rate assignment for multi-hop wireless networks. Specifically, we consider the problem of joint congestion control...
Chengnian Long, Bo Li, Qian Zhang, Bin Zhao, Bo Ya...
MMS
2008
13 years 6 months ago
Evalvid-RA: trace driven simulation of rate adaptive MPEG-4 VBR video
Due to the increasing deployment of conversational real-time applications like VoIP and videoconferencing, the Internet is today facing new challenges. Low end-to-end delay is a vi...
Arne Lie, Jirka Klaue
« Prev « First page 1362 / 1368 Last » Next »