Sciweavers

6025 search results - page 1011 / 1205
» Flexibility in Service Processes
Sort
View
QOFIS
2004
Springer
15 years 9 months ago
Cross-Layer Analytical Modeling of Wireless Channels for Accurate Performance Evaluation
Abstract. An intention to adopt IP protocol for future mobile communication and subsequent extension of Internet services to the air interface calls for advanced performance modeli...
Dmitri Moltchanov, Yevgeni Koucheryavy, Jarmo Harj...
TSD
2004
Springer
15 years 9 months ago
Slovak Speech Database for Experiments and Application Building in Unit-Selection Speech Synthesis
Abstract. After the years of hesitation the conservative Slovak telecommunication market seems to become conscious of the need of voice driven services. In the last year, all the t...
Milan Rusko, Marián Trnka, Sachia Darz&aacu...
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 9 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
NCA
2003
IEEE
15 years 9 months ago
SWIFT: Scheduling in Web Servers for Fast Response Time
This paper addresses the problem of how to service web requests quickly in order to minimize the client response time. Some of the recent work uses the idea of the Shortest Remain...
Mayank Rawat, Ajay D. Kshemkalyani
SACMAT
2003
ACM
15 years 9 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
« Prev « First page 1011 / 1205 Last » Next »