Sciweavers

1195 search results - page 208 / 239
» Deployment Time Performance Optimization of Internet Service...
Sort
View
MOBISEC
2009
Springer
14 years 2 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
AAAI
2000
13 years 9 months ago
Nurse Rostering at the Hospital Authority of Hong Kong
This paper describes the Rostering Engine (RE) that we have developed for the Hospital Authority (HA), Hong Kong as part of their Staff Rostering System (SRS) using AI constraint-...
Andy Hon Wai Chun, Steve Ho Chuen Chan, Garbbie Pu...
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
MOBICOM
2003
ACM
14 years 1 months ago
Topology control for wireless sensor networks
We consider a two-tiered Wireless Sensor Network (WSN) consisting of sensor clusters deployed around strategic locations and base-stations (BSs) whose locations are relatively fl...
Jianping Pan, Yiwei Thomas Hou, Lin Cai, Yi Shi, S...
TC
1998
13 years 7 months ago
Analysis of Preventive Maintenance in Transactions Based Software Systems
—Preventive maintenance of operational software systems, a novel technique for software fault tolerance, is used specifically to counteract the phenomenon of software “aging.â€...
Sachin Garg, Antonio Puliafito, Miklós Tele...