Sciweavers

1030 search results - page 72 / 206
» Performance Evaluation of Network Systems Accounting for Use...
Sort
View
ICDCS
2003
IEEE
14 years 2 months ago
Performance Guarantees for Cluster-Based Internet Services
As web-based transactions become an essential element of everyday corporate and commerce activities, it becomes increasingly important that the performance of web-based services b...
Chang Li, Gang Peng, Kartik Gopalan, Tzi-cker Chiu...
QOFIS
2001
Springer
14 years 1 months ago
Constrained TCP-Friendly Congestion Control for Multimedia Communication
With the lack of admission control and resource reservation mechanisms in the Internet, overload situations can only be avoided by having the end systems deploying congestion cont...
Dorgham Sisalem, Adam Wolisz
CTW
2008
92views more  CTW 2008»
13 years 7 months ago
WESTT (workload, error, situational awareness, time and teamwork): an analytical prototyping system for command and control
Modern developments in the use of information technology within command and control allow unprecedented degrees of flexibility in the way teams deal with tasks. These developments...
Robert J. Houghton, Chris Baber, Malcolm Cowton, G...
RAID
2010
Springer
13 years 7 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
CORR
2007
Springer
150views Education» more  CORR 2007»
13 years 8 months ago
Social Information Processing in Social News Aggregation
The rise of social media sites — blogs, wikis, and Digg — underscores the transformation of the Web to a participatory medium in which users are collaboratively creating, eval...
Kristina Lerman