Sciweavers

203 search results - page 30 / 41
» Second-Order Risk Constraints
Sort
View
CCGRID
2008
IEEE
14 years 1 months ago
A Stochastic Programming Approach for QoS-Aware Service Composition
—We formulate the service composition problem as a multi-objective stochastic program which simultaneously optimizes the following quality of service (QoS) parameters: workflow ...
Wolfram Wiesemann, Ronald Hochreiter, Daniel Kuhn
IPPS
2007
IEEE
14 years 1 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
FDL
2006
IEEE
14 years 1 months ago
Functional Virtual Prototyping Design Flow and VHDL-AMS
Needs in the worldwide competition push teams to master more and more their design flow in order to minimize risks, costs, time to market, and potential liabilities. The classical...
Yannick Hervé, Patricia Desgreys
IPCCC
2006
IEEE
14 years 1 months ago
SHARP: a new real-time scheduling algorithm to improve security of parallel applications on heterogeneous clusters
This paper addresses the problem of improving quality of security for real-time parallel applications on heterogeneous clusters. We propose a new security- and heterogeneity-drive...
Tao Xie 0004, Xiao Qin, Mais Nijim
WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...