Sciweavers

618 search results - page 38 / 124
» An Approach to Discover Dependencies between Service Operati...
Sort
View
CONEXT
2008
ACM
14 years 11 months ago
Instability free routing: beyond one protocol instance
Today, a large body of research exists regarding the correctness of routing protocols. However, many reported global disruptions of Internet connectivity, e.g., inter-AS persisten...
Franck Le, Geoffrey G. Xie, Hui Zhang
ICAS
2005
IEEE
143views Robotics» more  ICAS 2005»
15 years 3 months ago
Approaches to P2P Internet Application Development
Research in overlay and P2P networking has been tightly focused on fundamentals in the last few years, leading to developments on a range of important issues. The time has come to...
Thabotharan Kathiravelu, Arnold Pears
SIGSOFT
2008
ACM
14 years 9 months ago
Efficient online monitoring of web-service SLAs
If an organization depends on the service quality provided by another organization it often enters into a bilateral service level agreement (SLA), which mitigates outsourcing risk...
Franco Raimondi, James Skene, Wolfgang Emmerich
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
15 years 3 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux
CHIMIT
2008
ACM
14 years 11 months ago
Policy-based IT automation: the role of human judgment
Policy-based automation is emerging as a viable approach to IT systems management, codifying high-level business goals into executable specifications for governing IT operations. ...
Eser Kandogan, John H. Bailey, Paul P. Maglio, Ebe...