Sciweavers

721 search results - page 94 / 145
» A Logic-Based Access Control Approach For Web Services
Sort
View
EUROMICRO
2004
IEEE
13 years 11 months ago
Handover in Mobile Communication Networks: Who is in Control Anyway?
The migration from 3rd generation mobile communication networks to 4th generation, purely IP-based networks leads to new chances, but also great risks for the traditional mobile n...
Frank A. Zdarsky, Jens B. Schmitt
JSAC
2007
180views more  JSAC 2007»
13 years 7 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
SIGOPS
2008
145views more  SIGOPS 2008»
13 years 7 months ago
Towards distributed storage resource management using flow control
Deployment of shared storage systems is increasing with rapid adoption of virtualization technologies to provide isolation, better management and high utilization of resources. Qu...
Ajay Gulati, Irfan Ahmad
ICDE
2009
IEEE
122views Database» more  ICDE 2009»
14 years 9 months ago
Secure Enterprise Services Consumption for SaaS Technology Platforms
Over recent years there has been increased level of discussion on utility pricing for software. The focus of these discussions is to create new operating cost models where the unit...
Yücel Karabulut, Ike Nassi
ICECCS
2008
IEEE
168views Hardware» more  ICECCS 2008»
14 years 2 months ago
Ubiquitous Service Regulation Based on Dynamic Rules
Ubiquitous computing systems can be regarded as open systems where heterogeneous and previously unknown entities may spontaneously interact, due to intrinsic mobility of users and...
José Viterbo Filho, Markus Endler, Jean-Pie...