Skip to main content

previous disabled Page of 8
and
Your search also matched 1,062 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Providing services in a World of IBC Resources: An architectural approach

Include preview-only content
  1. Chapter and Conference Paper

    Adjusted Probabilistic Packet Marking for IP Traceback

    Distributed denial-of-service attack is one of the greatest threats to the Internet today. One of the biggest difficulties in defending against this attack is that attackers always use incorrect, or “spoofed” ...

    Tao Peng, Christopher Leckie in NETWORKING 2002: Networking Technologies, … (2002)

  2. Chapter and Conference Paper

    Towards a Knowledge-Based Approach to Semantic Service Composition

    The successful application of Grid and Web Service technologies to real-world problems, such as e-Science [1], requires not only the development of a common vocabulary and meta-data framework as the basis for ...

    Liming Chen, Nigel R. Shadbolt, Carole Goble, Feng Tao in The Semantic Web - ISWC 2003 (2003)

  3. Chapter and Conference Paper

    Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring

    In this paper, we propose a simple but robust scheme to detect denial of service attacks (including distributed denial of service attacks) by monitoring the increase of new IP addresses. Unlike previous propos...

    Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao in Networking 2004 (2004)

  4. Chapter and Conference Paper

    The NDMP-Plus Prototype Design and Implementation for Network Based Data Management

    Network based data management/backup/restore is the key component in the data storage centre. This paper proposes a new net-work based data management — NDMP-Plus. We firstly discuss the components of the NDMP...

    Kai Ouyang, **gli Zhou, Tao **a, Shengsheng Yu in Network and Parallel Computing (2004)

  5. Chapter and Conference Paper

    S-RIP: A Secure Distance Vector Routing Protocol

    Distance vector routing protocols (e.g., RIP) have been widely used on the Internet, and are being adapted to emerging wireless ad hoc networks. However, it is well-known that existing distance vector routing ...

    Tao Wan, Evangelos Kranakis in Applied Cryptography and Network Security (2004)

  6. Chapter and Conference Paper

    An Architecture for Unifying Web Services Authentication and Authorization

    Security issues are one of the major deterrents to Web Services adoption in mission critical applications and to the realization of the dynamic e- Business vision of Service Oriented Computing. Role Based Acce...

    Robert Steele, Will Tao in Service-Oriented Computing - ICSOC 2005 (2005)

  7. Chapter and Conference Paper

    Exploiting Traffic Localities for Efficient Flow State Lookup

    Flow state tables are an essential component for improving the performance of packet classification in network security and traffic management. Generally, a hash table is used to store the state of each flow d...

    Tao Peng, Christopher Leckie in NETWORKING 2005. Networking Technologies, … (2005)

  8. Chapter and Conference Paper

    A Parallel O(n27n/8) Time-Memory-Processor Tradeoff for Knapsack-Like Problems

    A general-purpose parallel three-list four-table algorithm that can solve a number of knapsack-like NP-complete problems is developed in this paper. Running on an EREW PRAM model, The proposed parallel algorit...

    Ken-Li Li, Ren-Fa Li, Yang Lei, Yan-Tao Zhou in Network and Parallel Computing (2005)

  9. Chapter and Conference Paper

    Performance of Server Selection Algorithms for Content Replication Networks

    In this paper, we investigate the problem of optimal server selection in “content replication networks,” such as peer-to-peer (P2P) and content delivery networks (CDNs). While a number of server selection poli...

    David Starobinski, Tao Wu in NETWORKING 2005. Networking Technologies, … (2005)

  10. Chapter and Conference Paper

    Service Selection Algorithms for Composing Complex Services with Multiple QoS Constraints

    One of the promises of the service-oriented architecture (SOA) is that complex services can be composed using individual services. Individual services can be selected and integrated either statically or dynami...

    Tao Yu, Kwei-Jay Lin in Service-Oriented Computing - ICSOC 2005 (2005)

  11. Chapter and Conference Paper

    The New Cognition of Supply Chain Integration: Management Interface Integration

    As the basic concept of the management integration, the management interface can indicate the connection ways and mechanism of the node enterprises in the supply chain. According to the analysis on the princip...

    Tao Wu, Shuojia Guo, Rong-qiu Chen in Research and Practical Issues of Enterpris… (2006)

  12. Chapter and Conference Paper

    A Tourism Resources Integration Mechanism based on XML and Web Service

    To tackle problems such as isolated data islands in tourism as so much assorted data should be processed, it is constructed a platform that can share data and information of tourism resources. XML and Web Serv...

    Tao Hu, Weicai Du, Linfeng Dong in Research and Practical Issues of Enterpris… (2006)

  13. Chapter and Conference Paper

    Completing UML Model of Component-Based System with Middleware for Performance Evaluation

    To free analysts from knowing about the internal details of middleware when evaluating the performance of component-based system (CBS), this paper proposes a framework to automatically integrate middleware com...

    Yong Zhang, Ningjiang Chen, Jun Wei in Emerging Directions in Embedded and Ubiqui… (2006)

  14. Chapter and Conference Paper

    A Modeling Approach for Service-Oriented Architecture

    Specifying service-oriented system, which is a new type of Enterprise Information System, is critical with the rapid development of Web Services. For the purpose, this paper presents an approach to model Servi...

    Tao Zhang, Shing Ying, Sheng Cao in Research and Practical Issues of Enterpris… (2006)

  15. Chapter and Conference Paper

    Reuse Software Architecture through Dynamic Composition

    With the mature technology of software component and software architecture, software reuse has achieved significant progress. However, dynamic reusing software architecture such as in the condition of changing...

    ZaoQing Liang, Shi Ying, Rongzeng Cao in Research and Practical Issues of Enterpris… (2006)

  16. Chapter and Conference Paper

    Studies of Enterprises’ Modularization Decomposition

    “Modularity” theory has been widely applied in product design and manufacturing, system development etc., meanwhile the notion of “modularity” has been infiltrating into researches and practicalities of curren...

    Tao Wu, Wen** Wu, Shuojia Guo, Ronqiu Chen in Research and Practical Issues of Enterpris… (2006)

  17. Chapter and Conference Paper

    A Distributed Hierarchical Structure for Object Networks Supporting Human Activity Recognition

    Pervasive environments will witness heterogeneous smart embedded devices (e.g. sensors, actuators) integrated into user’s living environment (e.g. smart homes and hospitals) and provide a multitude of informat...

    Venet Osmani, Sasitharan Balasubramaniam in Autonomic Management of Mobile Multimedia … (2006)

  18. Chapter and Conference Paper

    Toward Making Online Biological Data Machine Understandable

    Huge amounts of biological data are available online. To obtain needed information, biologists sometimes have to traverse different Web sources and combine their data manually. We introduce a system that can a...

    Cui Tao in The Semantic Web - ISWC 2006 (2006)

  19. Chapter and Conference Paper

    Grid Computing Simulation and Verification Based on pi Calculus

    As weakness exists in describing behaviors and mobility in Petri Net theory, we put forward a mode using pi calculus to describe the gird computing, and present its simulation and verification. We briefly intr...

    Tao Hu, Shaofan Chen, Weibo Lin in Research and Practical Issues of Enterpris… (2006)

  20. Chapter and Conference Paper

    Dynamic Texture Synthesis in the YUV Color-Space

    Dynamic textures are representations of such textured surfaces that exhibit certain stationarity properties in time. These include sea-waves, smoke, foliage, whirlwind, dense crowds, and traffic scenes. We add...

    Leilei Xu, Hanqiu Sun, Jiaya Jia, Chenjun Tao in Entertainment Computing – ICEC 2007 (2007)

previous disabled Page of 8