Sciweavers

3031 search results - page 12 / 607
» Reuse in the application layer
Sort
View
ICPP
2005
IEEE
14 years 2 months ago
Session-Based Adaptive Overload Control for Secure Dynamic Web Applications
As dynamic web content and security capabilities are becoming popular in current web sites, the performance demand on application servers that host the sites is increasing, leadin...
Jordi Guitart, David Carrera, Vicenç Beltra...
IRI
2003
IEEE
14 years 2 months ago
Information Reuse and System Integration in the Development of a Hurricane Simulation System
- This paper presents our effort in designing and implementing an advanced hurricane simulation system on the platform of the World Wide Web for the purpose of supporting decisiona...
Shu-Ching Chen, Shahid Hamid, Sneh Gulati, Guo Che...
EKAW
1992
Springer
14 years 26 days ago
eQuality: An Application of DDucks to Process Management
Process management is a method for improving Boeing's business processes, however many aspects have been difficult to implement. eQuality is a software system based on a frame...
Jeffrey Bradshaw, Peter Holm, Oscar Kipersztok, Th...
ACSC
2007
IEEE
14 years 24 days ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
MOBIHOC
2001
ACM
14 years 8 months ago
Distributed assignment of encoded MAC addresses in sensor networks
In wireless sensor networks, the vast majority of wide-scale traffic consists of only a few bytes, including all network and application layer IDs. Therefore, MAC addresses, which...
Curt Schurgers, Gautam Kulkarni, Mani B. Srivastav...