Sciweavers

232 search results - page 25 / 47
» A Methodology to Provide and Use Interchangeable Services
Sort
View
JNCA
2008
123views more  JNCA 2008»
14 years 9 months ago
Edge-limited scalable QoS flow set-up
Although the Differentiated Services architecture supports scalable packet forwarding based on aggregate flows, the detailed procedure of Quality of Service (QoS) flow set-up with...
James Lembke, Byung Kyu Choi
81
Voted
CONCURRENCY
2002
199views more  CONCURRENCY 2002»
14 years 9 months ago
Application portals: practice and experience
The implementation of multiple Grid computing portals has led us to develop a methodology for Grid portal development that facilitates rapid prototyping and building of portals. B...
Mary Thomas, Maytal Dahan, Kurt Mueller, Stephen M...
CODES
2006
IEEE
15 years 1 months ago
A unified hardware/software runtime environment for FPGA-based reconfigurable computers using BORPH
This paper presents a hw/sw codesign methodology based on BORPH, an operating system designed for FPGA-based reconfigurable computers (RC's). By providing native kernel suppo...
Hayden Kwok-Hay So, Artem Tkachenko, Robert W. Bro...
NETWORKING
2008
14 years 11 months ago
Network Performance Assessment Using Adaptive Traffic Sampling
Multimedia and real-time services are spreading all over the Internet. The delivery quality of such contents is closely related to its network performance, for example in terms suc...
René Serral-Gracià, Albert Cabellos-...
117
Voted
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 4 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...