Sciweavers

1128 search results - page 168 / 226
» A Case for Buffer Servers
Sort
View
MINENET
2005
ACM
15 years 5 months ago
ACAS: automated construction of application signatures
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identifi...
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck...
ER
2005
Springer
177views Database» more  ER 2005»
15 years 5 months ago
Conceptual Content Management for Enterprise Web Services
Web services aim at providing an interoperable framework for cross system and multiple domain communication. Current basic standards are allowing for first cases of practical use ...
Sebastian Bossung, Hans-Werner Sehring, Joachim W....
NOSSDAV
2005
Springer
15 years 5 months ago
Natural selection in peer-to-peer streaming: from the cathedral to the bazaar
Success of peer-to-peer applications in many cases is attributed to user altruism, where a user contributes some of its own resources to facilitate performance of other users. Thi...
Vivek Shrivastava, Suman Banerjee
CW
2003
IEEE
15 years 5 months ago
Educative Distributed Virtual Environments For Children
This paper presents a distributed virtual reality environment for children called EVE— Environnements Virtuels pour Enfants. The virtual environment architecture is reactive age...
Jean-Pierre Gerval, Dorin Mircea Popovici, Jacques...
ICSM
2003
IEEE
15 years 5 months ago
Characterizing the 'Security Vulnerability Likelihood' of Software Functions
Software maintainers and auditors would benefit from a tool to help them focus their attention on functions that are likely to be the source of security vulnerabilities. However,...
Dan DaCosta, Christopher Dahn, Spiros Mancoridis, ...