Sciweavers

571 search results - page 6 / 115
» On Exploiting System Dynamics Modeling to Identify Service R...
Sort
View
OTM
2005
Springer
15 years 3 months ago
An Hybrid Intermediation Architectural Approach for Integrating Cross-Organizational Services
Nowadays, workflow research has shifted from fundamentals of workflow modelling and enactment towards improvement of the workflow modelling lifecycle and integration of workflow en...
Giannis Verginadis, Panagiotis Gouvas, Gregoris Me...
94
Voted
ICC
2011
IEEE
206views Communications» more  ICC 2011»
13 years 9 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
CSCW
2004
ACM
15 years 1 months ago
Putting systems into place: a qualitative study of design requirements for location-aware community systems
We present a conceptual framework for location-aware community systems and results from two studies of how sociallydefined places influence people's information sharing and c...
Quentin Jones, Sukeshini A. Grandhi, Steve Whittak...
JPDC
2007
117views more  JPDC 2007»
14 years 9 months ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
WWW
2005
ACM
15 years 10 months ago
Ensuring required failure atomicity of composite Web services
The recent evolution of Internet, driven by the Web services technology, is extending the role of the Web from a support of information interaction to a middleware for B2B interac...
Sami Bhiri, Olivier Perrin, Claude Godart