Sciweavers

1426 search results - page 275 / 286
» Analyzing Web Service Based Business Processes
Sort
View
95
Voted
FASE
2009
Springer
15 years 8 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
93
Voted
CSE
2009
IEEE
15 years 8 months ago
Analysis of Vehicular Roaming through Multiple WLAN APs in Container Terminal
—This paper reports on measurement results for the simultaneous use of multiple WLAN APs in a large area. We describe some problems of applying legacy IEEE 802.11 WLAN technologi...
Hyun-Sung Park, Seung-Ho Han, Jong-Deok Kim
IFIP
2009
Springer
15 years 8 months ago
A Pipelined IP Address Lookup Module for 100 Gbps Line Rates and beyond
New Internet services and technologies call for higher packet switching capacities in the core network. Thus, a performance bottleneck arises at the backbone routers, as forwarding...
Domenic Teuchert, Simon Hauger
93
Voted
ACSAC
2008
IEEE
15 years 8 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
DATE
2008
IEEE
99views Hardware» more  DATE 2008»
15 years 8 months ago
Thermal Balancing Policy for Streaming Computing on Multiprocessor Architectures
As feature sizes decrease, power dissipation and heat generation density exponentially increase. Thus, temperature gradients in Multiprocessor Systems on Chip (MPSoCs) can serious...
Fabrizio Mulas, Michele Pittau, Marco Buttu, Salva...