Sciweavers

718 search results - page 130 / 144
» Operational Semantics of Security Protocols
Sort
View
PE
2007
Springer
154views Optimization» more  PE 2007»
13 years 7 months ago
QoS management in service-oriented architectures
The next generation of software systems will be highly distributed, component-based and service-oriented. They will need to operate in unattended mode and possibly in hostile envi...
Daniel A. Menascé, Honglei Ruan, Hassan Gom...
ISF
2010
164views more  ISF 2010»
13 years 5 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
TDSC
2010
160views more  TDSC 2010»
13 years 2 months ago
Dual-Quorum: A Highly Available and Consistent Replication System for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Edge services allow clients to access Internet service...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...
ICDE
1997
IEEE
136views Database» more  ICDE 1997»
14 years 9 months ago
Delegation: Efficiently Rewriting History
Transaction delegation, as introduced in ACTA, allows a transaction to transfer responsibility for the operations that it has performed on an object to another transaction. Delega...
Cris Pedregal Martin, Krithi Ramamritham
EDBT
2008
ACM
202views Database» more  EDBT 2008»
14 years 8 months ago
BeMatch: a platform for matchmaking service behavior models
The capability to easily find useful services (software applications, software components, scientific computations) becomes increasingly critical in several fields. Current approa...
Juan Carlos Corrales, Daniela Grigori, Mokrane Bou...