Sciweavers

153 search results - page 31 / 31
» From Business Rules to Application Rules in Rich Internet Ap...
Sort
View
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
13 years 6 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
ADT
2008
13 years 4 months ago
A service-oriented admission control strategy for class-based IP networks
The clear trend toward the integration of current and emerging applications and services in the Internet launches new demands on service deployment and management. Distributed serv...
Solange Rito Lima, Paulo Carvalho, Vasco Freitas
BMCBI
2007
107views more  BMCBI 2007»
13 years 4 months ago
OReFiL: an online resource finder for life sciences
Background: Many online resources for the life sciences have been developed and introduced in peer-reviewed papers recently, ranging from databases and web applications to data-an...
Yasunori Yamamoto, Toshihisa Takagi