Sciweavers

7565 search results - page 1455 / 1513
» Pricing Network Services
Sort
View
DKE
2011
260views Education» more  DKE 2011»
14 years 1 months ago
Analysis on demand: Instantaneous soundness checking of industrial business process models
We report on a case study on control-flow analysis of business process models. We checked 735 industrial business process models from financial services, telecommunications, and...
Dirk Fahland, Cédric Favre, Jana Koehler, N...
FAST
2011
14 years 1 months ago
A Scheduling Framework That Makes Any Disk Schedulers Non-Work-Conserving Solely Based on Request Characteristics
Exploiting spatial locality is critical for a disk scheduler to achieve high throughput. Because of the high cost of disk head seeks and the non-preemptible nature of request serv...
Yuehai Xu, Song Jiang
QUESTA
2011
14 years 19 days ago
Uniform approximations for the M/G/1 queue with subexponential processing times
: This paper studies the asymptotic behavior of the steady-state waiting time, W∞, of the M/G/1 queue with subexponenential processing times for different combinations of traffi...
Mariana Olvera-Cravioto, Peter W. Glynn
ICC
2011
IEEE
206views Communications» more  ICC 2011»
13 years 9 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...
INFOCOM
2012
IEEE
13 years 7 days ago
Socialize spontaneously with mobile applications
—With the proliferation of mobile devices in both smartphone and tablet form factors, it is intuitive and natural for users to socially interact with their collaborators or compe...
Zimu Liu, Yuan Feng, Baochun Li
« Prev « First page 1455 / 1513 Last » Next »