Sciweavers

1757 search results - page 310 / 352
» Secure Content Validation
Sort
View
120
Voted
SERVICES
2010
119views more  SERVICES 2010»
15 years 4 months ago
The Networked Environment for Music Analysis (NEMA)
Abstract--Conducting valid comparative evaluations of techniques in the field of Music Information Retrieval (MIR) presents particular challenges to MIR researchers due to issues o...
Kris West, Amit Kumar, Andrew Shirk, Guojun Zhu, J...
111
Voted
SERVICES
2008
85views more  SERVICES 2008»
15 years 4 months ago
Early Aspects for Non-Functional Properties in Service Oriented Business Processes
In Service Oriented Architecture, each application is often designed with a set of reusable services and a business process. In order to retain the reusability of services, it is ...
Hiroshi Wada, Junichi Suzuki, Katsuya Oba
134
Voted
NSDI
2004
15 years 3 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
124
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 2 months ago
Mosaic: Policy Homomorphic Network Extension
With the advent of large-scale cloud computing infrastructures, network extension has emerged as a major challenge in the management of modern enterprise networks. Many enterprise...
L. Erran Li, Michael F. Nowlan, Y. R. Yang
107
Voted
CORR
2010
Springer
64views Education» more  CORR 2010»
15 years 2 months ago
Selfish Response to Epidemic Propagation
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the ...
George Theodorakopoulos, Jean-Yves Le Boudec, John...