Sciweavers

472 search results - page 94 / 95
» Evaluating the Performance of Web Services Composition for N...
Sort
View
RTSS
1998
IEEE
13 years 10 months ago
Improved Response-Time Analysis Calculations
Schedulability analysis of fixed priority preemptive scheduled systems can be performed by calculating the worst-case response-time of the involved processes. The system is deemed...
Mikael Sjödin, Hans Hansson
ACSAC
2010
IEEE
13 years 4 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
ICC
2009
IEEE
115views Communications» more  ICC 2009»
14 years 1 months ago
Peer-to-Peer Application Recognition Based on Signaling Activity
—Because of the enormous growth in the number of peer-to-peer (P2P) applications in recent years, P2P traffic now constitutes a substantial proportion of Internet traffic. The ...
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Lau...
ICMCS
2009
IEEE
179views Multimedia» more  ICMCS 2009»
13 years 4 months ago
Providing QoS support for wireless remote healthcare system
Abstract--Recent advances in wireless sensor technology facilitate the development of remote healthcare systems, which can significantly reduce the healthcare cost. Despite the ini...
Shanshan Jiang, Yuan Xue, Annarita Giani, Ruzena B...
ASWEC
2006
IEEE
14 years 14 days ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...