Sciweavers

680 search results - page 86 / 136
» Locating Hidden Servers
Sort
View
IWPC
2006
IEEE
15 years 3 months ago
A Metric-Based Heuristic Framework to Detect Object-Oriented Design Flaws
One of the important activities in re-engineering process is detecting design flaws. Such design flaws prevent an efficient maintenance, and further development of a system. Th...
Mazeiar Salehie, Shimin Li, Ladan Tahvildari
NDSS
2005
IEEE
15 years 3 months ago
MOVE: An End-to-End Solution to Network Denial of Service
We present a solution to the denial of service (DoS) problem that does not rely on network infrastructure support, conforming to the end-to-end (e2e) design principle. Our approac...
Angelos Stavrou, Angelos D. Keromytis, Jason Nieh,...
ICS
2005
Tsinghua U.
15 years 3 months ago
Transparent caching with strong consistency in dynamic content web sites
We consider a cluster architecture in which dynamic content is generated by a database back-end and a collection of Web and application server front-ends. We study the effect of t...
Cristiana Amza, Gokul Soundararajan, Emmanuel Cecc...
NOSSDAV
2005
Springer
15 years 3 months ago
Peer-to-peer internet telephony using SIP
P2P systems inherently have high scalability, robustness and fault tolerance because there is no centralized server and the network self-organizes itself. This is achieved at the ...
Kundan Singh, Henning Schulzrinne
WMCSA
2003
IEEE
15 years 3 months ago
Application Management Techniques for the Bifrost System
This paper describes the adaptive component migration facility in the Bifrost Location-Independent Computing System. We present a facility that allows mobile clients to selectivel...
Avneesh Bhatnagar, Evan Speight, Dan Crawl, Joseph...