Sciweavers

488 search results - page 4 / 98
» Policy-Based Cryptography and Applications
Sort
View
MATA
2005
Springer
170views Communications» more  MATA 2005»
14 years 25 days ago
Adaptive Content for the Mobile User: A Policy-Based Approach
Service adaptation is fundamental to context-aware service provisioning and to the realization of the Virtual Home Environment concept, which is now an integral part of the 3G serv...
Alvin Yew, Antonio Liotta, Kun Yang
DSOM
2004
Springer
14 years 22 days ago
Policy-Based Resource Assignment in Utility Computing Environments
In utility computing environments, multiple users and applications are served from the same r esource pool. To maintain service level objectives and maintain high levels of utiliza...
Cipriano A. Santos, Akhil Sahai, Xiaoyun Zhu, Dirk...
AI
2000
Springer
13 years 11 months ago
Keep It Simple: A Case-Base Maintenance Policy Based on Clustering and Information Theory
Abstract. Today’s case based reasoning applications face several challenges. In a typical application, the case bases grow at a very fast rate and their contents become increasin...
Qiang Yang, Jing Wu
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
14 years 1 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
ICCSA
2005
Springer
14 years 26 days ago
Policy Based Handoff in MIPv6 Networks
As the requirements on high-availability for multimedia intensified new applications increase the pressure for the higher bandwidth on wireless networks, just upgrading to the high...
Jong-Hyouk Lee, Byungchul Park, Hyunseung Choo, Ta...