Sciweavers

1869 search results - page 344 / 374
» Analysis of Network Processing Workloads
Sort
View
ACMSE
2009
ACM
15 years 3 months ago
Towards policy driven self-configuration of user-centric communication
The convergence of various multimedia communications that includes voice, video and data presents many opportunities for enabling unified communication but paradoxically leads to ...
Paola Boettner, Mansi Gupta, Yali Wu, Andrew A. Al...
EUROMICRO
2009
IEEE
15 years 3 months ago
Synthetic Metrics for Evaluating Runtime Quality of Software Architectures with Complex Tradeoffs
Runtime quality of software, such as availability and throughput, depends on architectural factors and execution environment characteristics (e.g. CPU speed, network latency). Alth...
Anakreon Mentis, Panagiotis Katsaros, Lefteris Ang...
HPCC
2007
Springer
15 years 3 months ago
FTSCP: An Efficient Distributed Fault-Tolerant Service Composition Protocol for MANETs
Abstract. Service composition, which enables users to construct complex services from atomic services, is an essential feature for the usability of Mobile Ad hoc Networks (MANETs)....
Zhen-guo Gao, Sheng Liu, Ming Ji, Jinhua Zhao, Lih...
GLOBECOM
2009
IEEE
15 years 3 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 3 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...