Sciweavers

128 search results - page 21 / 26
» Controlling Deliberation with the Success Probability in a D...
Sort
View
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 1 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
ICIW
2009
IEEE
15 years 4 months ago
An Adaptive Scheduling Policy for Staged Applications
The performance of Web servers and application servers is a crucial factor for the success of the underlying business activity. Current commercial servers (such as Apache and Micr...
Mohammad Shadi Al Hakeem, Jan Richling, Gero M&uum...
GLOBECOM
2009
IEEE
14 years 7 months ago
Cooperative Communications with Relay Selection for QoS Provisioning in Wireless Sensor Networks
Abstract--Cooperative communications have been demonstrated to be effective in combating the multiple fading effects in wireless networks, and improving the network performance in ...
Xuedong Liang, Ilangko Balasingham, Victor C. M. L...
BPM
2006
Springer
153views Business» more  BPM 2006»
15 years 1 months ago
Shop Floor Information Management and SOA
Service Science is a new term for a new paradigm which aims at the solution of an obvious problem: How to make the increasing fusion of business and IT successful in a dynamically ...
Konrad Pfadenhauer, Burkhard Kittl, Schahram Dustd...
SAC
2004
ACM
15 years 2 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...