Sciweavers

3581 search results - page 121 / 717
» The Inframetric Model for the Internet
Sort
View
CORR
2010
Springer
68views Education» more  CORR 2010»
14 years 10 months ago
Comparative Study of Protocols Used for Establishing VPN
This is an Internet era. Most of the organizations try to establish their development centers and branch offices across the World. Employees working from their homes are also beco...
P. Venkateswari, T. Purusothaman
OTM
2010
Springer
14 years 8 months ago
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
In this paper, we present generic algorithms to ensure the consistency of mutual-exclusion and binding constraints in a business process context. We repeatedly identified the need...
Mark Strembeck, Jan Mendling
JMLR
2010
163views more  JMLR 2010»
14 years 4 months ago
Detection of Server-side Web Attacks
Web servers and server-side applications constitute the key components of modern Internet services. We present a pattern recognition system to the detection of intrusion attempts ...
Igino Corona, Giorgio Giacinto
PADS
2006
ACM
15 years 3 months ago
Modeling Autonomous-System Relationships
The development of realistic topology generators that produce faithful replicas of Internet topologies is critical for conducting realistic simulation studies of Internet protocol...
Xenofontas A. Dimitropoulos, George F. Riley
DSRT
2004
IEEE
15 years 1 months ago
Implementation of Host-Based Overlay Multicast to Support of Web Based Services for RT-DVS
Growing demand for use of Internet/Web-based services in real-time distributed virtual simulation (RT-DVS) and other real-time applications is fueling extensive interest in overla...
Dennis M. Moen, J. Mark Pullen, Fei Zhao