Sciweavers

112 search results - page 19 / 23
» Requirements Validation of a Voice Communication System Used...
Sort
View
EAAI
2008
116views more  EAAI 2008»
13 years 7 months ago
Robust neuro-identification of nonlinear plants in electric power systems with missing sensor measurements
Fault tolerant measurements are an essential requirement for system identification, control and protection. Measurements can be corrupted or interrupted due to sensor failure, bro...
Wei Qiao, Zhi Gao, Ronald G. Harley, Ganesh K. Ven...
XMLSEC
2003
ACM
14 years 19 days ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
GLOBECOM
2010
IEEE
13 years 4 months ago
On Comparing the Performance of Dynamic Multi-Network Optimizations
With a large variety of wireless access technologies available, multi-homed devices may strongly improve the performance and reliability of communication when using multiple networ...
Geert Jan Hoekstra, Robert D. van der Mei, J. W. B...
PE
2002
Springer
176views Optimization» more  PE 2002»
13 years 7 months ago
Effective bandwidth estimation and testing for Markov sources
This work addresses the resource sharing problem in broadband communication networks that can guarantee some quality of service (QoS), and develops some results about data source ...
Juan Pechiar, Gonzalo Perera, María Simon
CCS
2006
ACM
13 years 11 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch