Sciweavers

2165 search results - page 117 / 433
» cases 2005
Sort
View
82
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks
— In this paper, we propose a new approach called MAFIC (MAlicious Flow Identification and Cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by j...
Yu Chen, Yu-Kwong Kwok, Kai Hwang
124
Voted
ISSAC
2005
Springer
119views Mathematics» more  ISSAC 2005»
15 years 9 months ago
Computing the multiplicity structure in solving polynomial systems
This paper presents a duality analysis and an algorithm for computing the multiplicity structure of a zero to a polynomial system, while the zero can be exact or approximate with ...
Barry H. Dayton, Zhonggang Zeng
133
Voted
PPPJ
2004
ACM
15 years 9 months ago
New and improved: Linda in Java
This paper discusses the current resurgence of interest in the Linda coordination language for parallel and distributed programming. Particularly in the Java field, there have be...
George Wells
105
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
Surveying the factors that influence maintainability: research design
We want to explore and analyse design decisions that influence maintainability of software. Software maintainability is important because the effort expended on changes and fixes ...
Wiebe Hordijk, Roel Wieringa
153
Voted
CSMR
2005
IEEE
15 years 9 months ago
Database Wrappers Development: Towards Automatic Generation
Wrapping databases allows them to be reused in formerly unplanned contexts, such as web-based applications or federated systems. Indeed, a wrapper can provide external clients of ...
Philippe Thiran, Jean-Luc Hainaut, Geert-Jan Hoube...