Sciweavers

3089 search results - page 470 / 618
» services 2008
Sort
View
111
Voted
COMPUTER
2004
120views more  COMPUTER 2004»
15 years 3 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
130
Voted
CONCURRENCY
2004
77views more  CONCURRENCY 2004»
15 years 3 months ago
Grids of agents for computer and telecommunication network management
The centralized system approach for computer and telecommunication network management has been presenting scalability problems along with the growth in the number and diversity of...
Marcos Dias de Assunção, Fernando Lu...
142
Voted
CCR
2002
111views more  CCR 2002»
15 years 3 months ago
A taxonomy and design considerations for Internet accounting
Economic principles are increasingly being suggested for addressing some complex issues related to distributed resource allocation for QoS (Quality of Service) enhancement. Many p...
Michel Kouadio, Udo W. Pooch
146
Voted
CN
2002
112views more  CN 2002»
15 years 3 months ago
State-dependent M/G/1 type queueing analysis for congestion control in data networks
Abstract--We study in this paper a TCP-like linear-increase multiplicative-decrease flow control mechanism. We consider congestion signals that arrive in batches according to a Poi...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...
CN
2002
77views more  CN 2002»
15 years 3 months ago
MATE: multipath adaptive traffic engineering
Destination-based forwarding in traditional IP routers has not been able to take full advantage of multiple paths that frequently exist in Internet Service Provider Networks. As a...
Anwar Elwalid, Cheng Jin, Steven H. Low, Indra Wid...