Sciweavers

483 search results - page 71 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
SIGUCCS
2000
ACM
15 years 1 months ago
Linux and Open Source in the Academic Enterprise
Open Source Software (OSS) has made great strides toward mainstream acceptance over the past two years. However, many IT managers, both in business and academia, are still cautiou...
Mike Davis, Will O'Donovan, John Fritz, Carlisle C...
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
15 years 4 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
ANCS
2005
ACM
15 years 3 months ago
Framework for supporting multi-service edge packet processing on network processors
Network edge packet-processing systems, as are commonly implemented on network processor platforms, are increasingly required to support a rich set of services. These multi-servic...
Arun Raghunath, Aaron R. Kunze, Erik J. Johnson, V...
ISCAS
2002
IEEE
108views Hardware» more  ISCAS 2002»
15 years 2 months ago
Optimal adaptive bandwidth monitoring for QoS based retrieval
—Network aware multimedia delivery applications are a class of applications that provide certain level of quality of service (QoS) guarantees to end users while not assuming unde...
Yinzhe Yu, Anup Basu, Irene Cheng
CHI
2007
ACM
15 years 10 months ago
Journey planning based on user needs
In this paper we discuss potential developments to the design of pre-trip in-home journey planning services, to include support for additional user needs. These needs were identif...
Alisdair Owens, Daniel A. Smith, Max Wilson, Paul ...