Sciweavers

5333 search results - page 1028 / 1067
» Business
Sort
View
CN
2008
128views more  CN 2008»
14 years 9 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
CORR
2010
Springer
94views Education» more  CORR 2010»
14 years 9 months ago
Is Content Publishing in BitTorrent Altruistic or Profit-Driven
BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity ...
Rubén Cuevas Rumín, Michal Kryczka, ...
DKE
2008
158views more  DKE 2008»
14 years 9 months ago
Integration and verification of semantic constraints in adaptive process management systems
Adaptivity in process management systems is key to their successful applicability in practice. Approaches have been already developed to ensure system correctness after arbitrary ...
Linh Thao Ly, Stefanie Rinderle, Peter Dadam
GRID
2008
Springer
14 years 9 months ago
Can Economics-based Resource Allocation Prove Effective in a Computation Marketplace?
Several companies offer computation on demand for a fee. More companies are expected to enter this business over the next decade, leading to a marketplace for computation resource...
Kevin L. Mills, Christopher Dabrowski
CCR
2006
76views more  CCR 2006»
14 years 9 months ago
Secure distributed data-mining and its application to large-scale network measurements
The rapid growth of the Internet over the last decade has been startling. However, efforts to track its growth have often fallen afoul of bad data -- for instance, how much traffi...
Matthew Roughan, Yin Zhang
« Prev « First page 1028 / 1067 Last » Next »