Sciweavers

1477 search results - page 93 / 296
» Criteria for the evaluation of implemented architectures
Sort
View
COMSWARE
2007
IEEE
14 years 4 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
AIWORC
2000
IEEE
14 years 2 months ago
Building Flexible Mobile Applications for Next Generation Enterprises
In order to understand and gain practical insights into various aspects of Next Generation Enterprises, we are building a testbed for flexible mobile applications. We started with...
Karun Karunanithi, Khurram Haneef, Bruno Cordioli,...
CORR
2010
Springer
154views Education» more  CORR 2010»
13 years 10 months ago
A New Email Retrieval Ranking Approach
Email Retrieval task has recently taken much attention to help the user retrieve the email(s) related to the submitted query. Up to our knowledge, existing email retrieval ranking...
Samir AbdelRahman, Basma Hassan, Reem Bahgat
ESSOS
2011
Springer
13 years 1 months ago
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
Abstract. The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distribu...
Philippe De Ryck, Lieven Desmet, Wouter Joosen
ICDCS
2000
IEEE
14 years 2 months ago
Quartz: A QoS Architecture for Open Systems
This paper describes an architecture that provides support for quality of service (QoS) specification and enforcement in heterogeneous distributed computing systems. The Quartz Qo...
Frank Siqueira, Vinny Cahill