Sciweavers

1082 search results - page 173 / 217
» Policy support for call control
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
13 years 6 months ago
Downlink Resource Allocation for OFDMA-Based Multiservice Networks with Imperfect CSI
Abstract--This paper addresses practical implementation issues of resource allocation in OFDMA networks: inaccuracy of channel state information (CSI) available to the resource all...
Mohamad Khattar Awad, Veluppillai Mahinthan, Mehri...
SOSP
2007
ACM
14 years 5 months ago
AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications
The rise of the software-as-a-service paradigm has led to the development of a new breed of sophisticated, interactive applications often called Web 2.0. While web applications ha...
Emre Kiciman, V. Benjamin Livshits
CSFW
2009
IEEE
14 years 3 months ago
Updatable Security Views
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
AUSFORENSICS
2003
13 years 10 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
WWW
2010
ACM
14 years 3 months ago
Privacy wizards for social networking sites
Privacy is an enormous problem in online social networking sites. While sites such as Facebook allow users fine-grained control over who can see their profiles, it is difficult ...
Lujun Fang, Kristen LeFevre