Sciweavers

2517 search results - page 414 / 504
» Secure Deployment of Components
Sort
View
CN
2007
104views more  CN 2007»
13 years 9 months ago
Managing feature interactions between distributed SIP call control services
The Session Initiation Protocol (SIP) is widely used as a call control protocol for Voice over IP (VoIP), and indeed commercial implementations are readily available off-the-shel...
Mario Kolberg, Evan H. Magill
IVS
2008
124views more  IVS 2008»
13 years 9 months ago
Mobile analytics for emergency response and training
During emergency response events, situational awareness is critical in effectively managing and safe-guarding civilians and in-field personnel. To better support both command cent...
SungYe Kim, Ross Maciejewski, Karl Ostmo, Edward J...
JPDC
2006
112views more  JPDC 2006»
13 years 9 months ago
CEFT: A cost-effective, fault-tolerant parallel virtual file system
The vulnerability of computer nodes due to component failures is a critical issue for cluster-based file systems. This paper studies the development and deployment of mirroring in...
Yifeng Zhu, Hong Jiang
IJEB
2007
78views more  IJEB 2007»
13 years 9 months ago
E-government: a comparison of strategies in local authorities in the UK and Norway
In Europe almost all countries have implemented some form of e-government, not to mention the UK and Norway which are now both well into their sixth year of e-government implement...
Vishanth Weerakkody, Steve Jones, Elisabeth Olsen
JCM
2007
68views more  JCM 2007»
13 years 9 months ago
Cost-effective Product Traceability System Based on Widely Distributed Databases
— A cost-effective and easy way of introducing a product traceability system is to start from a small system and gradually extend it to a large-scale system. Traceability systems...
Shirou Wakayama, Yusuke Doi, Satoshi Ozaki, Atsush...