Sciweavers

45 search results - page 5 / 9
» Research on Data Fitting of key Model for Traffic Flow
Sort
View
PE
2008
Springer
113views Optimization» more  PE 2008»
13 years 5 months ago
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...
Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi
ICSE
2008
IEEE-ACM
14 years 6 months ago
Data flow testing of service-oriented workflow applications
WS-BPEL applications are a kind of service-oriented application. They use XPath extensively to integrate loosely-coupled workflow steps. However, XPath may extract wrong data from...
Lijun Mei, W. K. Chan, T. H. Tse
LISA
2001
13 years 6 months ago
The CoralReef Software Suite as a Tool for System and Network Administrators
Until now, system administrators have lacked a flexible real-time network traffic flow monitoring package. Such a package must provide a wide range of services but remain flexible ...
David Moore, Ken Keys, Ryan Koga, Edouard Lagache,...
ESCIENCE
2007
IEEE
13 years 9 months ago
Formal Modeling and Analysis of Scientific Workflows Using Hierarchical State Machines
Scientific workflows have recently emerged as a new paradigm for representing and managing complex distributed scientific computations and data analysis, and have enabled and acce...
Ping Yang, Zijiang Yang, Shiyong Lu
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 4 days ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...