Sciweavers

8933 search results - page 1743 / 1787
» Usability over time
Sort
View
CACM
2005
74views more  CACM 2005»
14 years 11 months ago
Separate handles from names on the internet
Networked communications inherently depend on the ability of the sender of a message to indicate through some token how the message should be delivered to a particular recipient. ...
Michael J. O'Donnell
TPDS
2008
78views more  TPDS 2008»
14 years 11 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
TPDS
2008
140views more  TPDS 2008»
14 years 11 months ago
High-Performance Resource Allocation and Request Redirection Algorithms for Web Clusters
Abstract-- With increasing richness in features such as personalization of content, web applications are becoming more complex and hence compute intensive. Traditional approaches t...
Supranamaya Ranjan, Edward W. Knightly
TPDS
2008
105views more  TPDS 2008»
14 years 11 months ago
Analysis of TTL-Based Consistency in Unstructured Peer-to-Peer Networks
Consistency maintenance is important to the sharing of dynamic contents in peer-to-peer (P2P) networks. The TTL-based mechanism is a natural choice for maintaining freshness in P2P...
Xueyan Tang, Jianliang Xu, Wang-Chien Lee
JITECH
2007
147views more  JITECH 2007»
14 years 11 months ago
Re-engineering at LeCroy Corporation: The move to component-based systems
This case study discusses two related aspects that are becoming increasingly important in today’s software development practice: re-engineering of a monolithic system into a com...
Julia Kotlarsky
« Prev « First page 1743 / 1787 Last » Next »