Sciweavers

2826 search results - page 457 / 566
» A resource-based analysis of IT sourcing
Sort
View
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
15 years 5 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
ICNP
1997
IEEE
15 years 5 months ago
TCP behavior with many flows
TCP's ability to share a bottleneck fairly and efficiently decreases as the number of competing flows increases. This effect starts to appear when there are more flows than p...
Robert Morris
ICNP
1997
IEEE
15 years 5 months ago
Optimal Feedback Control for ABR Service in ATM
The e cient support of data tra c over ATM networks requires congestion control, whose objectives include maximizing throughput, minimizing switch bu er requirement, and attaining...
Paolo Narváez, Kai-Yeung Siu
APSEC
1996
IEEE
15 years 5 months ago
A Prototype of a Concurrent Behavior Monitoring Tool for Testing of Concurrent Programs
Testing of concurrent programs is much more difficult than that of sequential programs. A concurrent program behaves nondeterministically, that is, the program may produce differe...
Eisuke Itoh, Zengo Furukawa, Kazuo Ushijima
WCRE
1996
IEEE
15 years 5 months ago
Finding Reusable Software Components in Large Systems
The extraction of reusable software components from existing systems is an attractive idea. The goal of the work in this paper is not to extract a component automatically, but to ...
James M. Neighbors