Sciweavers

668 search results - page 105 / 134
» Implementing and Evaluating Automatic Checkpointing
Sort
View
SIGSOFT
2008
ACM
14 years 9 months ago
Efficient online monitoring of web-service SLAs
If an organization depends on the service quality provided by another organization it often enters into a bilateral service level agreement (SLA), which mitigates outsourcing risk...
Franco Raimondi, James Skene, Wolfgang Emmerich
JNCA
2007
75views more  JNCA 2007»
14 years 9 months ago
Stateful DDoS attacks and targeted filtering
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...
Shigang Chen, Yong Tang, Wenliang Du
ENTCS
2002
101views more  ENTCS 2002»
14 years 9 months ago
Hypergeometric Functions in Exact Geometric Computation
Most problems in computational geometry are algebraic. A general approach to address nonrobustness in such problems is Exact Geometric Computation (EGC). There are now general lib...
Zilin Du, Maria Eleftheriou, José E. Moreir...
RAS
2000
130views more  RAS 2000»
14 years 9 months ago
Allocating optimal index positions on tool magazines using genetic algorithms
This paper presents an optimisation system software developed for the determination of optimal index positions of cutting tools on the automatic tool changer (ATC) or turret magaz...
Türkay Dereli, I. Hüseyin Filiz
IJAMC
2010
149views more  IJAMC 2010»
14 years 8 months ago
Deadline-Driven Auctions for NPC host allocation in P2P MMOGs
: This paper presents the design, implementation and evaluation of Deadline-Driven Auctions (DDA), a novel task mapping infrastructure for heterogeneous distributed environments. D...
Lu Fan, Philip W. Trinder, Hamish Taylor