Sciweavers

1012 search results - page 91 / 203
» Nomadic Service Points
Sort
View
148
Voted
CMS
2003
120views Communications» more  CMS 2003»
15 years 5 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
128
Voted
ICEBE
2007
IEEE
103views Business» more  ICEBE 2007»
15 years 3 months ago
Value and Goal Driven Design of E-Services
- E-services are used as the cornerstones for modeling interaction points of cooperating IT systems, within and between enterprises. So far, research and development of e-services ...
Martin Henkel, Paul Johannesson, Erik Perjons, Jel...
113
Voted
IPL
2008
61views more  IPL 2008»
15 years 3 months ago
Online chasing problems for regular polygons
We consider a server location problem with only one server to move. In this paper we assume that a request is given as a region and that the service can be done anywhere inside th...
Hiroshi Fujiwara, Kazuo Iwama, Kouki Yonezawa
131
Voted
SP
2002
IEEE
117views Security Privacy» more  SP 2002»
15 years 3 months ago
Grids: The top ten questions
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A di...
Jennifer M. Schopf, Bill Nitzberg
GLOBECOM
2009
IEEE
15 years 1 months ago
Modelling of the WCDMA Interface in the UMTS Network with Soft Handoff Mechanism
The paper proposes an analytical approach to blocking probability calculation in the UMTS network carrying a mixture of multi-rate traffic, under the assumption that the part of re...
Maciej Stasiak, Piotr Zwierzykowski, Damian Parnie...