Sciweavers

986 search results - page 115 / 198
» Protecting the Intranet Against
Sort
View
NOMS
2010
IEEE
189views Communications» more  NOMS 2010»
13 years 6 months ago
Self-optimization for handover oscillation control in LTE
— In this paper we analyze the performance of a self optimizing algorithm for handover parameter control which adjusts the settings depending on the oscillations experienced betw...
Jose Alonso-Rubio
VTC
2010
IEEE
121views Communications» more  VTC 2010»
13 years 6 months ago
MYRPA: An Incentive System with Reduced Payment Receipts for Multi-hop Wireless Networks
Abstract— In this paper, we propose an incentive system to stimulate the nodes’ cooperation in multi-hop wireless networks. Reducing the number and the size of the payment rece...
Mohamed Elsalih Mahmoud, Xuemin Shen
CSREASAM
2010
13 years 6 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
OTM
2010
Springer
13 years 6 months ago
Knowledge Representation with Autonomic Ontologies
The important role given to domain ontologies for knowledge representation implies increasing need for development and maintenance of them. However, we have a scarcity of tools sup...
Stainam Nogueira Brandão, Jonice Oliveira, ...
ICUMT
2009
13 years 5 months ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio