Sciweavers

1003 search results - page 109 / 201
» Understanding Availability
Sort
View
ISCI
2007
135views more  ISCI 2007»
14 years 11 months ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape
CCR
2005
64views more  CCR 2005»
14 years 11 months ago
A methodology for studying persistency aspects of internet flows
We focus in this paper on Internet flows, consider their contributions to the overall traffic per time unit or bin, and perform a multi-scale and multi-protocol analysis to explor...
Jörg Wallerich, Holger Dreger, Anja Feldmann,...
TSE
2008
101views more  TSE 2008»
14 years 11 months ago
DeMIMA: A Multilayered Approach for Design Pattern Identification
Design patterns are important in object-oriented programming because they offer design motifs, elegant solutions to recurrent design problems, which improve the quality of software...
Yann-Gaël Guéhéneuc, Giuliano A...
CLEIEJ
2004
95views more  CLEIEJ 2004»
14 years 11 months ago
Ontology and XML-based Specifications for Collaborative B2B Relationships
A collaborative B2B relationship implies jointly executing business processes. This relationship demands a complete access to available information and knowledge to support decisi...
María Laura Caliusco, María Rosa Gal...
COMCOM
2004
119views more  COMCOM 2004»
14 years 11 months ago
Modeling TCP performance with proxies
Abstract-- This paper investigates the TCP dynamics and performance over proxies that shorten the TCP feedback loop by segmenting the end-to-end connection. Such proxies are often ...
Navid Ehsan, Mingyan Liu