Sciweavers

59 search results - page 4 / 12
» Cross - Border Public Services: Analysis and Modeling
Sort
View
CCS
2001
ACM
13 years 12 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé

Publication
391views
14 years 9 months ago
Pedestrian access to transit: Identifying redundancies and gaps using a variable service area analysis
Identifying the percentage of the population being served by a transit system in a metropolitan region is a key performance measure. This performance measure depends mainly on the ...
El-Geneidy, A., Tétreault, P. & Surprenant-Legaul...
JCC
2011
105views more  JCC 2011»
13 years 2 months ago
Wordom: A user-friendly program for the analysis of molecular structures, trajectories, and free energy surfaces
Abstract: Wordom is a versatile, user-friendly, and efficient program for manipulation and analysis of molecular structures and dynamics. The following new analysis modules have b...
Michele Seeber, Angelo Felline, Francesco Raimondi...
NBIS
2009
Springer
13 years 12 months ago
Analysis of Web Alert Models
act— Web alerts are user-defined monitor conditions for public Internet information in which notification messages are sent to users whenever their alert conditions are met. The ...
Jameela Al-Jaroodi, Nader Mohamed
NOMS
1998
IEEE
160views Communications» more  NOMS 1998»
13 years 11 months ago
SP-to-SP service ordering specification and its implementation
Network Management Forum (NMF) has defined a set of basic business processes dealing with major TMN service management functions such as performance management, fault management, b...
Graham Chen, Qinzheng Kong, Pierre-Yves Benain