Sciweavers

187 search results - page 5 / 38
» On the characterizations of (S, N)-implications
Sort
View
VLDB
1989
ACM
137views Database» more  VLDB 1989»
13 years 11 months ago
Pasta-3's Graphical Query Language: Direct Manipulation, Cooperative Queries, Full Expressive Power
Graphical Direct Manipulation (GrDM) query languagesare characterized and positioned with respect to traditional textual query languages. After a brief survey of the current state...
Michel Kuntz, Rainer Melchert
ISPEC
2007
Springer
14 years 1 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
ISCA
1998
IEEE
126views Hardware» more  ISCA 1998»
13 years 12 months ago
Switcherland: A QoS Communication Architecture for Workstation Clusters
Computer systems have become powerful enough to process continuous data streams such as video or animated graphics. While processing power and communication bandwidth of today...
Hans Eberle, Erwin Oertli
CN
2007
80views more  CN 2007»
13 years 7 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
NOMS
2008
IEEE
105views Communications» more  NOMS 2008»
14 years 2 months ago
Characterization of IP flows eligible for lambda-connections in optical networks
Abstract—The advance on data transmission in optical networks has allowed data forwarding decisions to be taken at multiple levels in the protocol stack (e.g., at network and opt...
Tiago Fioreze, Mattijs Oude Wolbers, Remco van de ...