Sciweavers

2372 search results - page 346 / 475
» Probabilistic calling context
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
Evaluating Mobility Pattern Space Routing for DTNs
— Because a delay tolerant network (DTN) can often be partitioned, routing is a challenge. However, routing benefits considerably if one can take advantage of knowledge concerni...
Jeremie Leguay, Timur Friedman, Vania Conan
ISCC
2006
IEEE
134views Communications» more  ISCC 2006»
14 years 2 months ago
A Proposed Framework for Calibration of Available Bandwidth Estimation Tools
Examining the validity or accuracy of proposed available bandwidth estimation tools remains a challenging problem. A common approach consists of evaluating a newly developed tool ...
Joel Sommers, Paul Barford, Walter Willinger
SCAM
2006
IEEE
14 years 2 months ago
Normalizing Metamorphic Malware Using Term Rewriting
Metamorphic malware — including certain viruses and worms — rewrite their code during propagation. This paper presents a method for normalizing multiple variants of metamorphi...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
AOSD
2006
ACM
14 years 2 months ago
Doxpects: aspects supporting XML transformation interfaces
In the web services environment software development can involve writing both object-oriented programs and XML transformations. This can be seen in the popular Web Services archit...
Eric Wohlstadter, Kris De Volder
DOLAP
2006
ACM
14 years 2 months ago
Designing what-if analysis: towards a methodology
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need b...
Matteo Golfarelli, Stefano Rizzi, Andrea Proli