Sciweavers

186 search results - page 24 / 38
» Traffic Measurements for Link Dimensioning - A Case Study
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
DOLAP
2005
ACM
14 years 11 months ago
Goal-oriented requirement analysis for data warehouse design
Several surveys indicate that a significant percentage of data warehouses fail to meet business objectives or are outright failures. One of the reasons for this is that requireme...
Paolo Giorgini, Stefano Rizzi, Maddalena Garzetti
NOMS
2008
IEEE
15 years 4 months ago
PathCrawler: Automatic harvesting web infra-structure
Abstract—As network topologies have grown in size and complexity, it is becoming a daunting task for network administrators to keep track the capacity dimensioning of newly insta...
Cesar Marcondes, M. Y. Sanadidi, Mario Gerla, Ramo...
90
Voted
COMSWARE
2008
IEEE
15 years 4 months ago
Call admission control: QoS issue for VoIP
—One of the vital key elements for providing Quality of Service (QoS) for VoIP is the Call Admission Control (CAC) capabilities of the Session Management /Call Session Control Fu...
Mohammad Asadul Hoque, Farhana Afroz
INTERACT
2003
14 years 11 months ago
Does an Individual's Myers-Briggs Type Indicator Preference Influence Task-Oriented Technology Use?
: Technology innovators face the challenge of finding representative groups of users to participate in design activities. In some cases, software applications will target an audien...
Pamela J. Ludford, Loren G. Terveen