Sciweavers

1120 search results - page 178 / 224
» Using Enterprise Architecture Models for System Quality Anal...
Sort
View
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
15 years 1 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 6 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
VLSID
2008
IEEE
191views VLSI» more  VLSID 2008»
15 years 7 months ago
Programming and Performance Modelling of Automotive ECU Networks
The last decade has seen a phenomenal increase in the use of electronic components in automotive systems, resulting in the replacement of purely mechanical or hydraulic-implementa...
Samarjit Chakraborty, Sethu Ramesh
JSAC
2007
107views more  JSAC 2007»
15 years 1 months ago
DESENT: decentralized and distributed semantic overlay generation in P2P networks
Abstract— The current approach in web searching, i.e., centralized search engines, rises issues that question their future applicability: 1) coverage and scalability, 2) freshnes...
Christos Doulkeridis, Kjetil Nørvåg, ...
CN
2006
124views more  CN 2006»
15 years 1 months ago
Session based access control in geographically replicated Internet services
Performance critical services over Internet often rely on geographically distributed architectures of replicated servers. Content Delivery Networks (CDN) are a typical example whe...
Novella Bartolini