Sciweavers

338 search results - page 27 / 68
» Operational Models for Reputation Servers
Sort
View
EOR
2006
68views more  EOR 2006»
13 years 7 months ago
Modelling complex assemblies as a queueing network for lead time control
In this paper we develop an open queueing network for optimal design of multi-stage assemblies, in which each service station represents a manufacturing or assembly operation. The...
Amir Azaron, Hideki Katagiri, Kosuke Kato, Masatos...
USENIX
2001
13 years 9 months ago
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables
We present Malicious Email Filter, MEF, a freely distributed malicious binary filter incorporated into Procmail that can detect malicious Windows attachments by integrating with a...
Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Man...
PDPTA
2008
13 years 9 months ago
Predicting Web Cache Behavior using Stochastic State-Space Models
Web caches play an important role in improving the surfing experience of Web clients and reducing the network traffic seen by Web servers. Accurate analytical models of Web caches ...
Amitayu Das, Ritendra Datta, Bhuvan Urgaonkar, Ana...
MODELS
2007
Springer
14 years 1 months ago
Relating Navigation and Request Routing Models in Web Applications
A navigation model describes the possible sequences of web pages a user can visit, and a request routing model describes how server side components handle each request. Earlier we...
Minmin Han, Christine Hofmeister
SOUPS
2005
ACM
14 years 1 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar