Sciweavers

1973 search results - page 329 / 395
» Issues in the Integration of IN and TMN
Sort
View
WISEC
2009
ACM
14 years 4 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
ICSOC
2009
Springer
14 years 3 months ago
Evaluating Contract Compatibility for Service Composition in the SeCO2 Framework
Recently, the Software-as-a-Service (SaaS) model has been increasingly supported, becoming a major part of the new emerging cloud computing paradigms. Although SaaS exists in diff...
Marco Comerio, Hong Linh Truong, Flavio De Paoli, ...
ICAC
2008
IEEE
14 years 3 months ago
Utility-Based Reinforcement Learning for Reactive Grids
—Large scale production grids are an important case for autonomic computing. They follow a mutualization paradigm: decision-making (human or automatic) is distributed and largely...
Julien Perez, Cécile Germain-Renaud, Bal&aa...
IPPS
2008
IEEE
14 years 3 months ago
The design of a versatile, secure P2PSIP communications architecture for the public internet
Communications systems, encompassing VoIP, IM, and other personal media, present different challenges for P2P environments than other P2P applications. In particular, reliable com...
David A. Bryan, Bruce Lowekamp, Marcia Zangrilli
ISCC
2008
IEEE
123views Communications» more  ISCC 2008»
14 years 3 months ago
Improving reliability and energy efficiency of disk systems via utilization control
As disk drives become increasingly sophisticated and processing power increases, one of the most critical issues of designing modern disk systems is data reliability. Although num...
Kiranmai Bellam, Adam Manzanares, Xiaojun Ruan, Xi...