Sciweavers

55 search results - page 9 / 11
» Analytic Calculus of Response Time in Networked Automation S...
Sort
View
EJIS
2006
79views more  EJIS 2006»
13 years 5 months ago
A genealogical study of boundary-spanning IS design
This paper presents the design of a business-aligned information system (IS) from an actor-network perspective, viewing non-human intermediaries jointly as inscriptions and bounda...
Susan Gasson
CN
2007
137views more  CN 2007»
13 years 5 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
IJES
2006
110views more  IJES 2006»
13 years 5 months ago
Partitioning bin-packing algorithms for distributed real-time systems
Embedded real-time systems must satisfy not only logical functional requirements but also para-functional properties such as timeliness, Quality of Service (QoS) and reliability. W...
Dionisio de Niz, Raj Rajkumar
JDCTA
2010
172views more  JDCTA 2010»
13 years 3 days ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
JSAC
2010
153views more  JSAC 2010»
13 years 2 days ago
Autonomic traffic engineering for network robustness
Abstract--The continuously increasing complexity of communication networks and the increasing diversity and unpredictability of traffic demand has led to a consensus view that the ...
Ali Tizghadam, Alberto Leon-Garcia