Sciweavers

636 search results - page 122 / 128
» Latency Performance of SOAP Implementations
Sort
View
CORR
2010
Springer
236views Education» more  CORR 2010»
14 years 6 months ago
Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes
As more and more multi-tier services are developed from commercial off-the-shelf components or heterogeneous middleware without source code available, both developers and administr...
Bo Sang, Jianfeng Zhan, Zhihong Zhang, Lei Wang, D...
MOBISYS
2009
ACM
16 years 5 days ago
A framework of energy efficient mobile sensing for automatic user state recognition
Urban sensing, participatory sensing, and user activity recognition can provide rich contextual information for mobile applications such as social networking and location-based se...
Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacob...
SOSP
2003
ACM
15 years 8 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
NCA
2009
IEEE
15 years 6 months ago
Simulating Fixed Virtual Nodes for Adapting Wireline Protocols to MANET
Abstract— The Virtual Node Layer (VNLayer) is a programtraction for Mobile Ad Hoc Networks (MANETs). It defines simple virtual servers at fixed locations in a network, addressi...
Jiang Wu, Nancy D. Griffeth, Nancy A. Lynch, Calvi...
ACSAC
2008
IEEE
15 years 6 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh