Sciweavers

2116 search results - page 104 / 424
» Resource Analysis by Sup-interpretation
Sort
View
138
Voted
DEXAW
2004
IEEE
132views Database» more  DEXAW 2004»
15 years 7 months ago
Using Data-Flow Analysis for Resilience and Result Checking in Peer-To-Peer Computations
To achieve correct execution of peer-to-peer applications on non-reliable resources, we present a portable and distributed algorithm that provides fault tolerance and result checki...
Samir Jafar, Sébastien Varrette, Jean-Louis...
134
Voted
ISW
2000
Springer
15 years 7 months ago
Performance Analysis of Secure Web Server Based on SSL
Abstract. In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (...
Xiaodong Lin, Johnny W. Wong, Weidong Kou
132
Voted
FMCO
2008
Springer
167views Formal Methods» more  FMCO 2008»
15 years 5 months ago
Formal Behavioral Modeling and Compliance Analysis for Service-Oriented Systems
In this paper, we present a framework for formal modeling and verification of service-based business processes with focus on their compliance to external regulations such as Segreg...
Natallia Kokash, Farhad Arbab
100
Voted
APVIS
2007
15 years 5 months ago
Visualization of sanitized email logs for spam analysis
Email has become an integral method of communication. However, it is still plagued by vast amounts of spam. Many statistical techniques, such as Bayesian filtering, have been app...
Chris Muelder, Kwan-Liu Ma
117
Voted
PDPTA
2003
15 years 5 months ago
Analysis and Enhancement of Pipelining the Protocol Overheads for a High Throughput
This paper investigates the protocol overhead pipelining between the host and network interface card (NIC). Existing researches into the protocol overhead pipelining assume that p...
Hyun-Wook Jin, Chuck Yoo