Sciweavers

6025 search results - page 1067 / 1205
» Flexibility in Service Processes
Sort
View
128
Voted
ICNS
2009
IEEE
15 years 10 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
INFOCOM
2009
IEEE
15 years 10 months ago
Network Bandwidth Allocation via Distributed Auctions with Time Reservations
—This paper studies the problem of allocating network capacity through periodic auctions. Motivated primarily by a service overlay architecture, we impose the following condition...
Pablo Belzarena, Andrés Ferragut, Fernando ...
ISMAR
2009
IEEE
15 years 10 months ago
Using AR to support cross-organisational collaboration in dynamic tasks
This paper presents a study where Augmented Reality (AR) technology has been used as a tool for supporting collaboration between the rescue services, the police and military perso...
Susanna Nilsson, Björn J. E. Johansson, Arne ...
131
Voted
ATAL
2009
Springer
15 years 10 months ago
MABLE: a framework for learning from natural instruction
The Modular Architecture for Bootstrapped Learning Experiments (MABLE) is a system that is being developed to allow humans to teach computers in the most natural manner possible: ...
Roger Mailler, Daniel Bryce, Jiaying Shen, Ciaran ...
152
Voted
CIKM
2009
Springer
15 years 10 months ago
A case study on model driven data integration for data centric software development
Model Driven Data Integration is a data integration approach that proactively incorporates and utilizes metadata across the data integration process. By decoupling data and metada...
Hyeonsook Kim, Ying Zhang, Samia Oussena, Tony Cla...
« Prev « First page 1067 / 1205 Last » Next »