Sciweavers

663 search results - page 97 / 133
» PKI design for the real world
Sort
View
COMSWARE
2006
IEEE
13 years 11 months ago
VoIP service quality monitoring using active and passive probes
Service providers and enterprises all over the world are rapidly deploying Voice over IP (VoIP) networks because of reduced capital and operational expenditure, and easy creation o...
Shipra Agrawal, P. P. S. Narayan, Jeyashankher Ram...
EDBTW
2006
Springer
13 years 11 months ago
Context Consistency Management Using Ontology Based Model
Abstract. Inconsistent contexts are death-wounds which usually result in contextaware applications' incongruous behaviors and users' perplexed feelings, therefore the ben...
Yingyi Bu, Shaxun Chen, Jun Li, XianPing Tao, Jian...
ER
2006
Springer
137views Database» more  ER 2006»
13 years 11 months ago
Preference Functional Dependencies for Managing Choices
Abstract. The notion of user preference in database modeling has recently received much attention in advanced applications, such as personalization of e-services, since it captures...
Wilfred Ng
FLOPS
2006
Springer
13 years 11 months ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov
ANSS
2001
IEEE
13 years 11 months ago
Building a Web-Based Federated Simulation System with Jini and XML
In a Web-Based federated simulation system, a group of simulation models residing on different machines attached to the Internet, called federates, collaborate with each other to ...
Xueqin Huang, John A. Miller