Sciweavers

1984 search results - page 323 / 397
» The colourful feasibility problem
Sort
View
NOMS
2010
IEEE
134views Communications» more  NOMS 2010»
13 years 8 months ago
Packet sampling for worm and botnet detection in TCP connections
—Malware and botnets pose a steady and growing threat to network security. Therefore, packet analysis systems examine network traffic to detect active botnets and spreading worm...
Lothar Braun, Gerhard Münz, Georg Carle
OTM
2010
Springer
13 years 8 months ago
Collecting, Annotating, and Classifying Public Web Services
The limitations of the traditional SOA operational model, such as the lack of rich service descriptions, weaken the role of service registries. Their removal from the model violate...
Mohammed AbuJarour, Felix Naumann, Mircea Craculea...
PERCOM
2010
ACM
13 years 8 months ago
ReSCo: A middleware component for Reliable Service Composition in pervasive systems
Abstract—Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as th...
Brent Lagesse, Mohan Kumar, Matthew Wright
PVLDB
2010
151views more  PVLDB 2010»
13 years 8 months ago
Database Compression on Graphics Processors
Query co-processing on graphics processors (GPUs) has become an effective means to improve the performance of main memory databases. However, this co-processing requires the data ...
Wenbin Fang, Bingsheng He, Qiong Luo
SIROCCO
2010
13 years 8 months ago
Optimal Deterministic Ring Exploration with Oblivious Asynchronous Robots
We consider the problem of exploring an anonymous unoriented ring of size n by k identical, oblivious, asynchronous mobile robots, that are unable to communicate, yet have the abil...
Anissa Lamani, Maria Gradinariu Potop-Butucaru, S&...