Sciweavers

335 search results - page 62 / 67
» Control patterns in a healthcare network
Sort
View
CSFW
2009
IEEE
13 years 12 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
CN
2006
161views more  CN 2006»
13 years 8 months ago
A multimedia traffic modeling framework for simulation-based performance evaluation studies
The emergence of high-speed communication systems has enabled the support of complex multimedia applications. The traffic patterns generated by such applications are likely to be ...
Assen Golaup, Hamid Aghvami
JSW
2008
101views more  JSW 2008»
13 years 7 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
ITNG
2010
IEEE
13 years 6 months ago
Towards Adaptive Replication Reconfiguration for QoS
— Replication is a technique widely used for large networked software systems to provide qualities such as reliability, availability, performance and scalability to their clients...
Raihan Al-Ekram, Richard C. Holt
TITS
2010
110views Education» more  TITS 2010»
13 years 2 months ago
Research Collaboration and ITS Topic Evolution: 10 Years at T-ITS
This paper investigates the collaboration patterns and research topic trends in the publications of the IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (T-ITS) over the pas...
Linjing Li, Xin Li, Changjian Cheng, Cheng Chen, G...