Sciweavers

2187 search results - page 58 / 438
» Providing Security Services in a Resource Discovery System
Sort
View
IADIS
2003
13 years 11 months ago
Information Management and Interoperability Strategies: The Case for Digital Identifiers
The move from the current compartmentalised systems into an interoperable environment is the central challenge facing digital development this decade. In the quest for a semantic ...
Robin Wilson
NGC
2000
Springer
14 years 1 months ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi
SAINT
2007
IEEE
14 years 4 months ago
Privacy-Aware Context Discovery for Next Generation Mobile Services
We present a system that enables applications to discover and obtain information that describes the context of a particular entity (e.g., a user or a device). Our system revolves ...
Cristian Hesselman, Henk Eertink, Martin Wibbels
ICWN
2003
13 years 11 months ago
Providing Secondary Access in a Cellular Network
— Most wireless systems receive a license that gives them exclusive access to a block of spectrum. Exclusivity guarantees adequate quality of service, but it also leads to inefï¬...
Sooksan Panichpapiboon, Jon M. Peha
HICSS
2008
IEEE
175views Biometrics» more  HICSS 2008»
14 years 4 months ago
Service-Oriented Resource Management
Service Management controls how business services are developed and delivered to customers. Business services must be flexible negotiable between customer and provider. Temporal a...
Jürgen Dorn, Hannes Werthner