Sciweavers

73 search results - page 13 / 15
» Service Oriented Application Management - Do Current Techniq...
Sort
View
CCS
2001
ACM
13 years 11 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
SIGUCCS
2000
ACM
13 years 11 months ago
Training... A Key to Better Help Desk Consultants
The quality of student consultants and their development through training and education are major factors in determining long-term effectiveness of university Help Desk. To hire a...
Anna Maria Perez, Andrea J. Moore
DGO
2008
135views Education» more  DGO 2008»
13 years 8 months ago
Florida Public Hurricane Loss Model (FPHLM): research experience in system integration
The Florida Public Hurricane Loss Model (FPHLM) developed in the State of Florida offers an open, public and effective tool for the government to regulate the insurance ratemaking...
Shu-Ching Chen, Min Chen, Na Zhao, Shahid Hamid, K...
VLSID
2002
IEEE
151views VLSI» more  VLSID 2002»
14 years 7 months ago
Mode Selection and Mode-Dependency Modeling for Power-Aware Embedded Systems
Among the many techniques for system-level power management, it is not currently possible to guarantee timing constraints and have a comprehensive system model at the same time. S...
Dexin Li, Pai H. Chou, Nader Bagherzadeh
JSAC
2010
153views more  JSAC 2010»
13 years 1 months ago
Autonomic traffic engineering for network robustness
Abstract--The continuously increasing complexity of communication networks and the increasing diversity and unpredictability of traffic demand has led to a consensus view that the ...
Ali Tizghadam, Alberto Leon-Garcia