Sciweavers

1003 search results - page 109 / 201
» Understanding Availability
Sort
View
ISCI
2007
135views more  ISCI 2007»
15 years 1 months ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape
CCR
2005
64views more  CCR 2005»
15 years 1 months ago
A methodology for studying persistency aspects of internet flows
We focus in this paper on Internet flows, consider their contributions to the overall traffic per time unit or bin, and perform a multi-scale and multi-protocol analysis to explor...
Jörg Wallerich, Holger Dreger, Anja Feldmann,...
TSE
2008
101views more  TSE 2008»
15 years 1 months ago
DeMIMA: A Multilayered Approach for Design Pattern Identification
Design patterns are important in object-oriented programming because they offer design motifs, elegant solutions to recurrent design problems, which improve the quality of software...
Yann-Gaël Guéhéneuc, Giuliano A...
CLEIEJ
2004
95views more  CLEIEJ 2004»
15 years 1 months ago
Ontology and XML-based Specifications for Collaborative B2B Relationships
A collaborative B2B relationship implies jointly executing business processes. This relationship demands a complete access to available information and knowledge to support decisi...
María Laura Caliusco, María Rosa Gal...
COMCOM
2004
119views more  COMCOM 2004»
15 years 1 months ago
Modeling TCP performance with proxies
Abstract-- This paper investigates the TCP dynamics and performance over proxies that shorten the TCP feedback loop by segmenting the end-to-end connection. Such proxies are often ...
Navid Ehsan, Mingyan Liu