Sciweavers

1519 search results - page 131 / 304
» What do they think
Sort
View
WSC
2004
13 years 11 months ago
"One" a New Tool for Supply Chain Network Optimization and Simulation
Nowadays, in a hotly competitive environment, companies are continuously trying to provide products and/or services to customers faster, cheaper, and better than the competitors d...
Hongwei Ding, Lyès Benyoucef, Xiaolan Xie, ...
IPPS
2006
IEEE
14 years 4 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
ACSAC
2005
IEEE
14 years 4 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
DAGSTUHL
2006
13 years 11 months ago
New tricks from an old dog: An overview of TEI P5
This paper presents an update on the current state of development of the Text Encoding Initiative's Guidelines for Electronic Text Encoding and Interchange. Since the last ma...
Lou Burnard
CMG
1997
13 years 11 months ago
Capacity Planning in Distributed Environments
Capacity Planning has been a discipline practiced by IT since before the invention of the mainframe. It encompasses different measurement, analysis, modeling and reporting techniq...
Bernard Domanski