Sciweavers

2236 search results - page 359 / 448
» Secure Software Design in Practice
Sort
View
PAM
2010
Springer
15 years 4 months ago
Yes, We LEDBAT: Playing with the New BitTorrent Congestion Control Algorithm
Since December 2008, the official BitTorrent client is using a new congestion-control protocol for data transfer, implemented at the application layer and built over UDP at the tr...
Dario Rossi, Claudio Testa, Silvio Valenti
AGILEDC
2008
IEEE
15 years 4 months ago
Fully Distributed Scrum: The Secret Sauce for Hyperproductive Offshored Development Teams
Scrum was designed to achieve a hyperproductive state where productivity increases 5-10 times over industry averages and many collocated teams have achieved this effect. The quest...
Jeff Sutherland, Guido Schoonheim, Eelco Rustenbur...
ISPASS
2008
IEEE
15 years 4 months ago
Explaining the Impact of Network Transport Protocols on SIP Proxy Performance
This paper characterizes the impact that the use of UDP versus TCP has on the performance and scalability of the OpenSER SIP proxy server. The Session Initiation Protocol (SIP) is...
Kaushik Kumar Ram, Ian C. Fedeli, Alan L. Cox, Sco...
ASWEC
2007
IEEE
15 years 4 months ago
A Configurable Event Correlation Architecture for Adaptive J2EE Applications
Distributed applications that adapt as their environment changes are developed from selfmanaging, self-configuring and self-optimising behaviours. This requires constant monitorin...
Yan Liu, Ian Gorton, Vinh Khanh Le
SCAM
2007
IEEE
15 years 4 months ago
Extending Attribute Grammars with Collection Attributes--Evaluation and Applications
Collection attributes, as defined by Boyland, can be used as a mechanism for concisely specifying cross-referencelike properties such as callee sets, subclass sets, and sets of v...
Eva Magnusson, Torbjörn Ekman, Görel Hed...