Sciweavers

1082 search results - page 134 / 217
» Policy support for call control
Sort
View
ESORICS
2004
Springer
14 years 2 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
ICFP
2009
ACM
14 years 9 months ago
A theory of typed coercions and its applications
A number of important program rewriting scenarios can be recast as type-directed coercion insertion. These range from more theoretical applications such as coercive subtyping and ...
Nikhil Swamy, Michael W. Hicks, Gavin M. Bierman
SIGMETRICS
2008
ACM
159views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Weighted fair sharing for dynamic virtual clusters
In a shared server infrastructure, a scheduler controls how quantities of resources are shared over time in a fair manner across multiple, competing consumers. It should support w...
Laura E. Grit, Jeffrey S. Chase
COMCOM
2004
102views more  COMCOM 2004»
13 years 8 months ago
A scalable architecture for end-to-end QoS provisioning
The Differentiated Services (DiffServ) architecture has been proposed by the Internet Engineering Task Force as a scalable solution for providing end-to-end Quality of Service (Qo...
Spiridon Bakiras, Victor O. K. Li
ICMCS
1997
IEEE
140views Multimedia» more  ICMCS 1997»
14 years 12 days ago
MusiKalscope: A Graphical Musical Instrument
This paper introduces a new multi-media system for musical and graphical expression called MusiKalscope. Inside of MusiKalscope are two sub-systems: RhyMe and the Iamascope, conne...
Sidney Fels, Kazushi Nishimoto, Kenji Mase