Sciweavers

529 search results - page 29 / 106
» Source Address Validation: Architecture and Protocol Design
Sort
View
142
Voted
JAMIA
2010
115views more  JAMIA 2010»
14 years 8 months ago
The population health record: concepts, definition, design, and implementation
In 1997, the American Medical Informatics Association proposed a US information strategy that included a population health record (PopHR). Despite subsequent progress on the conce...
Daniel J. Friedman, R. Gibson Parrish II
CN
2006
112views more  CN 2006»
15 years 1 months ago
Optimal server allocations for streaming multimedia applications on the Internet
In this paper, we address the server selection problem for streaming applications on the Internet. The architecture we consider is similar to the content distribution networks con...
Padmavathi Mundur, Poorva Arankalle
112
Voted
SENSYS
2009
ACM
15 years 8 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
ISESE
2005
IEEE
15 years 7 months ago
Quality vs. quantity: comparing evaluation methods in a usability-focused software architecture modification task
A controlled experiment was performed to assess the usefulness of portions of a Usability-Supporting Architectural Pattern (USAP) in modifying the design of software architectures...
Elspeth Golden, Bonnie E. John, Len Bass
123
Voted
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 7 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...