Sciweavers

258 search results - page 49 / 52
» Monotony in Service Orchestrations
Sort
View
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
15 years 4 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
ICDE
2007
IEEE
166views Database» more  ICDE 2007»
15 years 4 months ago
Enforcing Context-Sensitive Policies in Collaborative Business Environments
As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose...
Alberto Sardinha, Jinghai Rao, Norman M. Sadeh
COREGRID
2007
Springer
15 years 4 months ago
Co-Allocating Compute and Network Resources
Distributed applications or workflows need to access and use compute, storage and network resources simultaneously or chronologically coordinated respectively. Examples are distri...
Thomas Eickermann, Lidia Westphal, Oliver Wäl...
INFOCOM
2003
IEEE
15 years 3 months ago
Smooth Multirate Multicast Congestion Control
— A significant impediment to deployment of multicast services is the daunting technical complexity of developing, testing and validating congestion control protocols fit for w...
Gu-In Kwon, John W. Byers
CCS
2006
ACM
15 years 1 months ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...