Sciweavers

631 search results - page 107 / 127
» Why Model
Sort
View
RAID
1999
Springer
14 years 27 days ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
ACMICEC
2005
ACM
175views ECommerce» more  ACMICEC 2005»
14 years 2 months ago
A theoretic discussion of tourism e-commerce
This paper presents the model of e-market structure and process analysis of tourism e-commerce. First the tourism e-commerce status quo is given clearly; secondly e-commerce and i...
Si-qing Liu
SIAMSC
2008
148views more  SIAMSC 2008»
13 years 8 months ago
Multilevel Adaptive Aggregation for Markov Chains, with Application to Web Ranking
A multilevel adaptive aggregation method for calculating the stationary probability vector of an irreducible stochastic matrix is described. The method is a special case of the ada...
Hans De Sterck, Thomas A. Manteuffel, Stephen F. M...
PPOPP
2009
ACM
14 years 9 months ago
Effective performance measurement and analysis of multithreaded applications
Understanding why the performance of a multithreaded program does not improve linearly with the number of cores in a sharedmemory node populated with one or more multicore process...
Nathan R. Tallent, John M. Mellor-Crummey
CISIS
2009
IEEE
14 years 3 months ago
Strengths and Weaknesses of Maturity Driven Process Improvement Effort
In the recent decades most of the big organizations have adopted maturity driven process improvement efforts (MDPI). Most of these efforts have been inspired of maturity models li...
Asadullah Shaikh, Ashfaq Ahmed, Nasrullah Memon, M...