Sciweavers

1951 search results - page 239 / 391
» Decoupling Change from Design
Sort
View
CN
2006
112views more  CN 2006»
15 years 4 months ago
Optimal server allocations for streaming multimedia applications on the Internet
In this paper, we address the server selection problem for streaming applications on the Internet. The architecture we consider is similar to the content distribution networks con...
Padmavathi Mundur, Poorva Arankalle
JUCS
2006
94views more  JUCS 2006»
15 years 4 months ago
UML-Based Modeling of Data-oriented WEB Applications
Abstract: Recently a growing demand has arisen for methods for the development of smalland medium scale Web Information Systems (WIS). Web applications are being built in a rapidly...
Attila Adamkó
ICSE
2008
IEEE-ACM
16 years 4 months ago
The international workshop on software architectures and mobility (SAM 2008)
E-businesses are increasingly facing the need of porting the provision of their e-services to mobile customers. Evolving requirements, such as reliability, security, scalability, ...
Licia Capra, Rami Bahsoon, Wolfgang Emmerich, Moha...
IAT
2008
IEEE
15 years 10 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 10 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...