Sciweavers

636 search results - page 100 / 128
» Security Management in the Next Generation Wireless Networks
Sort
View
TGC
2007
Springer
14 years 2 months ago
A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a c...
Ricardo Corin, Pierre-Malo Deniélou
GROUP
2007
ACM
14 years 11 days ago
Searching for experts in the enterprise: combining text and social network analysis
Employees depend on other people in the enterprise for rapid access to important information. But current systems for finding experts do not adequately address the social implicat...
Kate Ehrlich, Ching-Yung Lin, Vicky Griffiths-Fish...
CORR
2007
Springer
160views Education» more  CORR 2007»
13 years 8 months ago
On the Correlation of Geographic and Network Proximity at Internet Edges and its Implications for Mobile Unicast and Multicast R
Signicant eort has been invested recently to accelerate handover operations in a next generation mobile Internet. Corresponding works for developing ecient mobile multicast man...
Thomas C. Schmidt, Matthias Wählisch, Ying Zh...
RR
2007
Springer
14 years 2 months ago
Evaluating Formalisms for Modular Ontologies in Distributed Information Systems
Modern semantic technology is one of the necessary supports for the infrastructure of next generation information systems. In particular, large international organizations, which u...
Yimin Wang, Jie Bao, Peter Haase, Guilin Qi
COREGRID
2007
Springer
14 years 2 months ago
Co-Allocating Compute and Network Resources
Distributed applications or workflows need to access and use compute, storage and network resources simultaneously or chronologically coordinated respectively. Examples are distri...
Thomas Eickermann, Lidia Westphal, Oliver Wäl...