Sciweavers

459 search results - page 39 / 92
» Malware Models for Network and Service Management
Sort
View
AICT
2006
IEEE
163views Communications» more  AICT 2006»
15 years 8 months ago
A Methodology for Searching Reusable Business Processes
Web Services are becoming the prominent paradigm for distributed computing and electronic businesses. This makes natural the extension of the concepts at the base of the workflow ...
Francesco Calabrese, Giovanni Di Dio, Anna Rita Fa...
GLOBECOM
2009
IEEE
14 years 11 months ago
Modelling of the WCDMA Interface in the UMTS Network with Soft Handoff Mechanism
The paper proposes an analytical approach to blocking probability calculation in the UMTS network carrying a mixture of multi-rate traffic, under the assumption that the part of re...
Maciej Stasiak, Piotr Zwierzykowski, Damian Parnie...
STTT
2008
89views more  STTT 2008»
15 years 1 months ago
Modelling defence logistics networks
Military logistics concerns the activities required to support operational forces. It encompasses the storage and distribution of materiel, management of personnel and the provisio...
Guy Edward Gallasch, Nimrod Lilith, Jonathan Billi...
NETGAMES
2004
ACM
15 years 7 months ago
Implementation of a service platform for online games
Large-scale multiplayer online games require considerable investment in hosting infrastructures. However, the difficulty of predicting the success of a new title makes investing ...
Anees Shaikh, Sambit Sahu, Marcel-Catalin Rosu, Mi...
BTW
2007
Springer
189views Database» more  BTW 2007»
15 years 8 months ago
Reconsidering Consistency Management in Shared Data Spaces for Emergency and Rescue Applications
: Efficient information sharing is very important for emergency and rescue operations. These operations often have to be performed in environments where no communication infrastruc...
Thomas Plagemann, Ellen Munthe-Kaas, Vera Goebel