Sciweavers

451 search results - page 90 / 91
» What Is a Conversation Policy
Sort
View
JMLR
2006
113views more  JMLR 2006»
13 years 6 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
OCLC
2008
86views more  OCLC 2008»
13 years 6 months ago
Those who don't look don't find: disciplinary considerations in repository advocacy
Purpose of this paper By describing some of the often ignored aspects of repository advocacy, such as disciplinary differences and how these might affect the adoption of a particu...
Danny Kingsley
JAIR
2010
77views more  JAIR 2010»
13 years 4 months ago
Resource-Driven Mission-Phasing Techniques for Constrained Agents in Stochastic Environments
Because an agent’s resources dictate what actions it can possibly take, it should plan which resources it holds over time carefully, considering its inherent limitations (such a...
E. H. Durfee Wu, Edmund H. Durfee
HPCC
2009
Springer
13 years 4 months ago
Graph-Based Task Replication for Workflow Applications
Abstract--The Grid is an heterogeneous and dynamic environment which enables distributed computation. This makes it a technology prone to failures. Some related work uses replicati...
Raúl Sirvent, Rosa M. Badia, Jesús L...
IEPOL
2010
130views more  IEPOL 2010»
13 years 3 months ago
Piracy or promotion? The impact of broadband Internet penetration on DVD sales
ABSTRACT Digital computer networks represent a disruptive technology, with the potential to create or destroy economic value in established industries. These opportunities and chal...
Michael D. Smith, Rahul Telang