Sciweavers

262 search results - page 36 / 53
» Meetings and meeting modeling in smart environments
Sort
View
ASIACRYPT
2009
Springer
14 years 2 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...
CLUSTER
2008
IEEE
14 years 2 months ago
Empirical-based probabilistic upper bounds for urgent computing applications
—Scientific simulation and modeling often aid in making critical decisions in such diverse fields as city planning, severe weather prediction and influenza modeling. In some o...
Nick Trebon, Peter H. Beckman
CSSE
2002
IEEE
13 years 7 months ago
Characteristics of assured service and an alternative RIO scheme in differentiated services networks
Assured Service, a service model of Internet Differentiated Services (DiffServ) architecture, is not so well accommodated by the current Internet environment. This is because the I...
Seung-Joon Seok, Sung-Hyuck Lee, Jinwoo Park, Chul...
COMPSAC
2010
IEEE
13 years 4 months ago
Security in Context: Analysis and Refinement of Software Architectures
Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
ICNS
2008
IEEE
14 years 2 months ago
Traffic Distribution Forecasting in Packet-Switching Networks
: Traffic distribution forecasting is an essential step in network planning for packet-switching networks. It is frequently necessary to forecast and develop an optimal network con...
Faramak Zandi