Sciweavers

2131 search results - page 383 / 427
» Immunity for Closed Sets
Sort
View
MABS
2004
Springer
15 years 4 months ago
Formal Analysis of Meeting Protocols
Organizations depend on regular meetings to carry out their everyday tasks. When carried out successfully, meetings offer a common medium for participants to exchange ideas and mak...
Catholijn M. Jonker, Martijn C. Schut, Jan Treur, ...
PAM
2004
Springer
15 years 4 months ago
Measurements and Laboratory Simulations of the Upper DNS Hierarchy
Given that the global DNS system, especially at the higher root and top-levels, experiences significant query loads, we seek to answer the following questions: (1) How does the ch...
Duane Wessels, Marina Fomenkov, Nevil Brownlee, Ki...
ICDE
2010
IEEE
434views Database» more  ICDE 2010»
15 years 4 months ago
Route skyline queries: A multi-preference path planning approach
— In recent years, the research community introduced various methods for processing skyline queries in multidimensional databases. The skyline operator retrieves all objects bein...
Hans-Peter Kriegel, Matthias Renz, Matthias Schube...
DISCEX
2003
IEEE
15 years 4 months ago
NetBouncer: Client-legitimacy-based High-performance DDoS Filtering
We describe "NetBouncer", an approach and set of technologies for providing practical and highperformance defenses against distributed denial-ofservice (DDoS) attacks. T...
Roshan K. Thomas, Brian L. Mark, Tommy Johnson, Ja...
FCCM
2003
IEEE
135views VLSI» more  FCCM 2003»
15 years 4 months ago
Efficient Application Representation for HASTE: Hybrid Architectures with a Single, Transformable Executable
Hybrid architectures, which are composed of a conventional processor closely coupled with reconfigurable logic, seem to combine the advantages of both types of hardware. They pres...
Benjamin A. Levine, Herman Schmit