Sciweavers

412 search results - page 75 / 83
» Service Level Agreement Enforcement for Differentiated Servi...
Sort
View
ETT
2002
89views Education» more  ETT 2002»
14 years 9 months ago
Delay analysis of a probabilistic priority discipline
In computer networks, the Strict Priority (SP) discipline is perhaps the most common and simplest method to schedule packets from different classes of applications, each with diver...
Yuming Jiang, Chen-Khong Tham, Chi Chung Ko
CCS
2010
ACM
15 years 4 months ago
A lattice-based approach to mashup security
A web mashup is a web application that integrates content from different providers to create a new service, not offered by the content providers. As mashups grow in popularity, ...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
SAINT
2009
IEEE
15 years 4 months ago
Analyzing the Aftermath of the McColo Shutdown
This paper examines how spam behavior was impacted by the shutdown of McColo, a service provider known for its lax security enforcement. Since the shutdown, a variety of sources h...
Steve DiBenedetto, Daniel Massey, Christos Papadop...
FLAIRS
2001
14 years 10 months ago
Facilitating the Exchange of Explicit Knowledge through Ontology Mappings
In this paper, we give an overview of a system (CAIMAN) that can facilitate the exchange of relevant documents between geographically dispersed people in Communities of Interest. ...
Martin S. Lacher, Georg Groh
RTSS
2003
IEEE
15 years 2 months ago
Power-aware QoS Management in Web Servers
Power management in data centers has become an increasingly important concern. Large server installations are designed to handle peak load, which may be significantly larger than...
Vivek Sharma, Arun Thomas, Tarek F. Abdelzaher, Ke...