Sciweavers

483 search results - page 77 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
ACMSE
2006
ACM
14 years 11 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad
83
Voted
OSDI
2000
ACM
14 years 10 months ago
Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java
Single-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the featur...
Godmar Back, Wilson C. Hsieh, Jay Lepreau
ISSTA
2004
ACM
15 years 2 months ago
Model checking XML manipulating software
The use of XML as the de facto data exchange standard has allowed integration of heterogeneous web based software systems regardless of implementation platforms and programming la...
Xiang Fu, Tevfik Bultan, Jianwen Su
APNOMS
2006
Springer
15 years 1 months ago
QoS-Aware Fair Scheduling in Wireless Ad Hoc Networks with Link Errors
To provide scheduling in wireless ad hoc networks, that is both highly efficient and fair in resource allocation, is not a trivial task because of the unique problems in wireless n...
Muhammad Mahbub Alam, Md. Mamun-Or-Rashid, Choong ...
66
Voted
ICSOC
2007
Springer
15 years 3 months ago
Deriving SOA Evaluation Metrics in an Enterprise Architecture Context
Abstract. Service oriented architectures (SOA) are becoming reality in a corporate environment. Rather than pure technology improvements SOA intends to increase manageability and s...
Stephan Aier, Maximilian Ahrens, Matthias Stutz, U...