Sciweavers

4320 search results - page 802 / 864
» Identity management architecture
Sort
View
IJNSEC
2006
200views more  IJNSEC 2006»
13 years 9 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
SIGMETRICS
2008
ACM
13 years 9 months ago
Ironmodel: robust performance models in the wild
Traditional performance models are too brittle to be relied on for continuous capacity planning and performance debugging in many computer systems. Simply put, a brittle model is ...
Eno Thereska, Gregory R. Ganger
TVLSI
2008
139views more  TVLSI 2008»
13 years 9 months ago
Ternary CAM Power and Delay Model: Extensions and Uses
Applications in computer networks often require high throughput access to large data structures for lookup and classification. While advanced algorithms exist to speed these search...
Banit Agrawal, Timothy Sherwood
CORR
2004
Springer
208views Education» more  CORR 2004»
13 years 9 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham
JUCS
2002
231views more  JUCS 2002»
13 years 9 months ago
Efficient Content-Based and Metadata Retrieval in Image Database
: Managing image data in a database system using metadata has been practiced since the last two decades. However, describing an image fully and adequately with metadata is practica...
Solomon Atnafu, Richard Chbeir, Lionel Brunie