Sciweavers

1642 search results - page 135 / 329
» Systemic Service Design: Aligning Value and Implementation
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 9 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
EMSOFT
2005
Springer
15 years 10 months ago
Semantics-based optimization across uncoordinated tasks in networked embedded systems
Microservers are networked embedded devices that accept user tasks on demand and execute them on real world information collected by sensors. Sharing intermediate sensing and comp...
Jie Liu, Elaine Cheong, Feng Zhao
WWW
2009
ACM
16 years 5 months ago
Discovering user profiles
In this paper we describe techniques for the discovery and construction of user profiles. Leveraging from the emergent data web, our system addresses the problem of sparseness of ...
Riddhiman Ghosh, Mohamed Dekhil
ESCIENCE
2007
IEEE
15 years 8 months ago
SOAs for Scientific Applications: Experiences and Challenges
Over the past several years, with the advent of the Open Grid Services Architecture (OGSA) [10] and the Web Services Resource Framework (WSRF) [14], Service-Oriented Architectures...
Sriram Krishnan, Karan Bhatia
137
Voted
WCRE
1999
IEEE
15 years 9 months ago
A Tool for Securely Integrating Legacy Systems into a Distributed Environment
Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a...
Timothy S. Souder, Spiros Mancoridis