Sciweavers

1462 search results - page 279 / 293
» Conditional Access in Mobile Systems: Securing the Applicati...
Sort
View
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
14 years 8 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
ICDE
2001
IEEE
167views Database» more  ICDE 2001»
14 years 8 months ago
Database Managed External File Update
RDBMS's have evolved to an extent that they are used to manage almost all of traditional business data in a robust fashion. Nevertheless, a large fraction of unstructured and...
Neeraj Mittal, Hui-I Hsiao
INFOCOM
2008
IEEE
14 years 1 months ago
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach
—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
Edson H. Watanabe, Daniel S. Menasché, Edmu...
ICSOC
2007
Springer
14 years 27 days ago
Service License Composition and Compatibility Analysis
Services enable the transformation of the World Wide Web as distributed interoperable systems interacting beyond organizational boundaries. Service licensing enables broader usage ...
G. R. Gangadharan, Michael Weiss, Vincenzo D'Andre...
ACL
1998
13 years 8 months ago
Evaluating Response Strategies in a Web-Based Spoken Dialogue Agent
While the notion of a cooperative response has been the focus of considerable research in natural language dialogue systems, there has been little empirical work demonstrating how...
Diane J. Litman, Shimei Pan, Marilyn A. Walker