Sciweavers

424 search results - page 53 / 85
» Service-Oriented Commonality Analysis Across Existing System...
Sort
View
USS
2008
13 years 10 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
NIME
2005
Springer
164views Music» more  NIME 2005»
14 years 2 months ago
Wireless Dance Control: PAIR and WISEAR
WISEAR (Wireless Sensor Array) is a Linux based Embeddedx86 TS- 5600 SBC (Single Board Computer) specifically configured for use with music, dance and video performance technologi...
Peter Swendsen, David Topper
SOSP
2009
ACM
14 years 5 months ago
Quincy: fair scheduling for distributed computing clusters
This paper addresses the problem of scheduling concurrent jobs on clusters where application data is stored on the computing nodes. This setting, in which scheduling computations ...
Michael Isard, Vijayan Prabhakaran, Jon Currey, Ud...
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
14 years 2 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury
LISA
2008
13 years 10 months ago
Portable Desktop Applications Based on P2P Transportation and Virtualization
Play-on-demand is usually regarded as a feasible access mode for web content (including streaming video, web pages and so on), web services and some Software-As-A-Service (SaaS) a...
Youhui Zhang, Xiaoling Wang, Liang Hong