Sciweavers

3667 search results - page 515 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
125
Voted
COMPSAC
2007
IEEE
15 years 10 months ago
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
Xia Wang, Johnny Wong
124
Voted
ECBS
2007
IEEE
144views Hardware» more  ECBS 2007»
15 years 10 months ago
DP-Miner: Design Pattern Discovery Using Matrix
Design patterns document expert design experience in software system development. They have been applied in many existing software systems. However, pattern information is general...
Jing Dong, Dushyant S. Lad, Yajing Zhao
135
Voted
EUROMICRO
2007
IEEE
15 years 10 months ago
A Performance Evaluation of RSerPool Server Selection Policies in Varying Heterogeneous Capacity Scenarios
Reliable Server Pooling (RSerPool) is a protocol framework for server redundancy and session failover, currently still under standardization by the IETF RSerPool WG. Server redund...
Thomas Dreibholz, Xing Zhou, Erwin P. Rathgeb
133
Voted
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
15 years 10 months ago
A Theoretical Perspective on Effective Interorganizational Knowledge
Interorganizational knowledge sharing is critical to knowledge intensive collaborations between organizations. Despite a proliferation of literature on knowledge sharing, most stu...
Nongkran Lertpittayapoom, Souren Paul, Peter P. My...
115
Voted
SCAM
2007
IEEE
15 years 10 months ago
Quality Assessment for Embedded SQL
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser