Sciweavers

8503 search results - page 1412 / 1701
» Secure Software Architectures
Sort
View
109
Voted
MOBILITY
2009
ACM
15 years 7 months ago
Mobile visual access to legacy voice-based applications
Vocal systems are a well-established reality. Examples of popular voice-based applications include helpdesk services, reservation systems, and vocal mailboxes. These services, tha...
Marco Avvenuti, Alessio Vecchio
COMPSAC
2008
IEEE
15 years 7 months ago
Parallel Table Lookup for Next Generation Internet
The rapid growth of Internet population leads to the shortage of IP addresses. The next generation IP protocol, IPv6, which extends the IP address length from 32 bits to 128 bits,...
Li-Che Hung, Yaw-Chung Chen
CSMR
2008
IEEE
15 years 7 months ago
Goto Elimination Strategies in the Migration of Legacy Code to Java
Legacy systems are often large and difficult to maintain, but rewriting them from scratch is usually not a viable option. Reenginering remains the only way to modernize them. We ...
Mariano Ceccato, Paolo Tonella, Cristina Matteotti
82
Voted
IPPS
2008
IEEE
15 years 7 months ago
Scalable server provisioning with HOP-SCOTCH
The problem of provisioning servers in a cluster infrastructure includes the issues of coordinating access and sharing of physical resources, loading servers with the appropriate ...
David Daly, M. A. Silva, José E. Moreira
117
Voted
ISPASS
2008
IEEE
15 years 7 months ago
Explaining the Impact of Network Transport Protocols on SIP Proxy Performance
This paper characterizes the impact that the use of UDP versus TCP has on the performance and scalability of the OpenSER SIP proxy server. The Session Initiation Protocol (SIP) is...
Kaushik Kumar Ram, Ian C. Fedeli, Alan L. Cox, Sco...
« Prev « First page 1412 / 1701 Last » Next »