Sciweavers

1990 search results - page 87 / 398
» Towards software-friendly networks
Sort
View
RAID
2009
Springer
15 years 11 months ago
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration
Abstract. Signature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures ...
Juan Caballero, Zhenkai Liang, Pongsin Poosankam, ...
AINA
2008
IEEE
15 years 6 months ago
A Case Study on Software Evolution towards Service-Oriented Architecture
The evolution of any software product over its lifetime is unavoidable, caused both by bugs to be fixed and by new requirements appearing in the later stages of the product's...
Félix Cuadrado, Boni García, Juan C....
KES
2005
Springer
15 years 10 months ago
Synthetic Character with Bayesian Network and Behavior Network for Intelligent Smartphone
As more people get using mobile phones, smartphone which is a new generation of mobile phone with computing capability earns world-wide reputation as new personal business assistan...
Sang-Jun Han, Sung-Bae Cho
NETWORKING
2000
15 years 5 months ago
An Interworking Call Control Solution for a Multidiscipline Switch
The development of multimedia services is pushing networking technologies towards broadband solutions. A lot of research and development effort has been spent on finding a universa...
Pertti Raatikainen, Sami Raatikainen
102
Voted
PERCOM
2009
ACM
16 years 5 months ago
Towards Adaptive Resource-Driven Routing
In pervasive computing environments, applications find themselves in constantly changing operating conditions. Such applications often need to discover locally available resources ...
Angela Dalton, Christine Julien