Sciweavers

2740 search results - page 308 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
AINA
2007
IEEE
15 years 10 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
ICC
2007
IEEE
127views Communications» more  ICC 2007»
15 years 10 months ago
Properties of the Traffic Output by a Leaky-Bucket Policer with Long-Range Dependent Input Traffic
 Long-range dependence (LRD) is a largely verified property of Internet traffic, which severely affects queuing performance in network buffers. A common approach for guaranteein...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...
RTA
2007
Springer
15 years 9 months ago
Rewriting Approximations for Fast Prototyping of Static Analyzers
This paper shows how to construct static analyzers using tree automata and rewriting techniques. Starting from a term rewriting system representing the operational semantics of the...
Yohan Boichut, Thomas Genet, Thomas P. Jensen, Luk...
TELETRAFFIC
2007
Springer
15 years 9 months ago
On the Use of Accounting Data for QoS-Aware IP Network Planning
We present an economically efficient framework for provision of essential input for QoS-aware IP network planning. Firstly, we define a process for reuse of network accounting data...
Alan Davy, Dmitri Botvich, Brendan Jennings
202
Voted
EEE
2005
IEEE
15 years 9 months ago
Towards Effective Web Site Designs: A Framework for Modeling, Design Evaluation and Enhancement
Effective Web site design is critical to the success of e-commerce. Therefore, the evaluation and enhancement of a Web site design is of great importance. In this vein, accessibil...
Benjamin Yen, Paul Jen-Hwa Hu, May Wang