Sciweavers

736 search results - page 72 / 148
» Goal-oriented requirement analysis for data warehouse design
Sort
View
106
Voted
PERCOM
2010
ACM
14 years 11 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 4 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
113
Voted
MOBIHOC
2006
ACM
16 years 6 days ago
Performance analysis of mobility-assisted routing
Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established. Mobility was considered a necessary evil that inval...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
114
Voted
CCGRID
2009
IEEE
15 years 7 months ago
C-Meter: A Framework for Performance Analysis of Computing Clouds
—Cloud computing has emerged as a new technology that provides large amount of computing and data storage capacity to its users with a promise of increased scalability, high avai...
Nezih Yigitbasi, Alexandru Iosup, Dick H. J. Epema...
94
Voted
ICSM
2008
IEEE
15 years 7 months ago
Supporting software evolution analysis with historical dependencies and defect information
More than 90% of the cost of software is due to maintenance and evolution. Understanding the evolution of large software systems is a complex problem, which requires the use of va...
Marco D'Ambros