Sciweavers

2573 search results - page 425 / 515
» Service Combinators for Web Computing
Sort
View
RTCSA
2006
IEEE
14 years 1 months ago
Maximizing Guaranteed QoS in (m, k)-firm Real-time Systems
(m,k)-firm constraints have been used to schedule tasks in soft/firm real-time systems under overloaded conditions. In general, they are provided by application designers to guara...
Jian (Denny) Lin, Albert M. K. Cheng
SOUPS
2006
ACM
14 years 1 months ago
Passpet: convenient password management and phishing protection
We describe Passpet, a tool that improves both the convenience and security of website logins through a combination of techniques. Password hashing helps users manage multiple acc...
Ka-Ping Yee, Kragen Sitaker
SACMAT
2005
ACM
14 years 1 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
VISUALIZATION
2003
IEEE
14 years 1 months ago
Visualization, Optimization, and Business Strategy: A Case Study
We describe a visualization application intended for operational use in formulating business strategy in the customer service arena. The visualization capability provided in this ...
Donna L. Gresh, Eugene I. Kelton
INFOCOM
2002
IEEE
14 years 26 days ago
Optimal MAC State Switching for cdma2000 Networks
— This paper deals with the performance modeling of the various MAC states as defined by the cdma2000 protocol. Our method uses a composite performance metric which has the capa...
Mainak Chatterjee, Sajal K. Das