Sciweavers

8135 search results - page 1422 / 1627
» network 2008
Sort
View
INFSOF
2007
139views more  INFSOF 2007»
15 years 3 months ago
Predicting software defects in varying development lifecycles using Bayesian nets
An important decision problem in many software projects is when to stop testing and release software for use. For many software products, time to market is critical and therefore ...
Norman E. Fenton, Martin Neil, William Marsh, Pete...
130
Voted
NCA
2008
IEEE
15 years 10 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
CCR
2008
110views more  CCR 2008»
15 years 4 months ago
Operational comparison of available bandwidth estimation tools
The available bandwidth of a path directly impacts the performance of throughput sensitive applications, e.g., p2p content replication or podcasting. Several tools have been devis...
Guillaume Urvoy-Keller, Taoufik En-Najjary, Alessa...
CACM
2005
126views more  CACM 2005»
15 years 3 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati
CCR
2004
105views more  CCR 2004»
15 years 3 months ago
The measurement manifesto
Useful measurement data is badly needed to help monitor and control large networks. Current approaches to solving measurement problems often assume minimal support from routers and...
George Varghese, Cristian Estan
« Prev « First page 1422 / 1627 Last » Next »