Sciweavers

1627 search results - page 82 / 326
» Service Variability Patterns
Sort
View
ACSAC
2006
IEEE
15 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
HT
2007
ACM
15 years 1 months ago
Simplifying web traversals by recognizing behavior patterns
Web sites must often service a wide variety of clients. Thus, it is inevitable that a web site will allow some visitors to find their information quickly while other visitors have...
Christian Doerr, Daniel von Dincklage, Amer Diwan
COMSWARE
2008
IEEE
15 years 4 months ago
Quantifying presence using calling patterns
—Presence technology is going to be an integral part of the next generation of communication technology. It can eliminate telephone tag between two parties (caller and callee), w...
Husain Husna, Santi Phithakkitnukoon, Enkh-Amgalan...
ACMSE
2006
ACM
15 years 3 months ago
Performance evaluation of the reactor pattern using the OMNeT++ simulator
The design of large-scale, distributed, performance-sensitive systems presents numerous challenges due to their networkcentric nature and stringent quality of service (QoS) requir...
Arundhati Kogekar, Aniruddha S. Gokhale
CALCO
2005
Springer
109views Mathematics» more  CALCO 2005»
15 years 3 months ago
Final Semantics for Event-Pattern Reactive Programs
Event-pattern reactive programs are front-end programs for distributed reactive components that preprocess an incoming stream of event stimuli. Their purpose is to recognize tempor...
César Sánchez, Henny B. Sipma, Matte...