Sciweavers

2624 search results - page 434 / 525
» The 2LIP model and its implementations
Sort
View
ICPADS
2005
IEEE
14 years 2 months ago
A Hybrid Web Server Architecture for e-Commerce Applications
The performance of an e-commerce application can be measured according to technical metrics but also following business indicators. The revenue obtained by a commercial web applic...
David Carrera, Vicenç Beltran, Jordi Torres...
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
14 years 2 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
SMA
2005
ACM
104views Solid Modeling» more  SMA 2005»
14 years 2 months ago
Packing a trunk: now with a twist!
In an industry project with a German car manufacturer we are faced with the challenge of placing a maximum number of uniform rigid rectangular boxes in the interior of a car trunk...
Friedrich Eisenbrand, Stefan Funke, Andreas Karren...
EDCC
2005
Springer
14 years 2 months ago
Structure-Based Resilience Metrics for Service-Oriented Networks
Many governmental agencies and businesses organizations use networked systems to provide a number of services. Such a service-oriented network can be implemented as an overlay on ...
Daniel J. Rosenkrantz, Sanjay Goel, S. S. Ravi, Ja...
GCC
2005
Springer
14 years 2 months ago
A Mathematical Foundation for Topology Awareness of P2P Overlay Networks
Abstract. In peer-to-peer (P2P) overlay networks, the mechanism of a peer randomly joining and leaving a network, causes a topology mismatch between the overlay and the underlying ...
Habib Rostami, Jafar Habibi