Sciweavers

546 search results - page 107 / 110
» Network Information Flow in Network of Queues
Sort
View
PE
2010
Springer
140views Optimization» more  PE 2010»
13 years 5 months ago
KPC-Toolbox: Best recipes for automatic trace fitting using Markovian Arrival Processes
We present the KPC-Toolbox, a library of MATLAB scripts for fitting workload traces into Markovian Arrival Processes (MAPs) in an automatic way based on the recently proposed Kro...
Giuliano Casale, Eddy Z. Zhang, Evgenia Smirni
APNOMS
2006
Springer
13 years 11 months ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon
COOPIS
2004
IEEE
13 years 11 months ago
Evaluation of a Group Communication Middleware for Clustered J2EE Application Servers
Abstract. Clusters have become the de facto platform to scale J2EE application servers. Each tier of the server uses group communication to maintain consistency between replicated ...
Takoua Abdellatif, Emmanuel Cecchet, Renaud Lachai...
SACMAT
2005
ACM
14 years 1 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
DSN
2004
IEEE
13 years 11 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...