Sciweavers

2178 search results - page 382 / 436
» Toward Systemically Secure IT Architectures
Sort
View
IJCAI
1997
13 years 9 months ago
Development of Iterative Real-time Scheduler to Planner Feedback
Planning for real-time applications involves decisions not only about what actions to take in what states to progress toward achieving goals (the traditional decision problem face...
Charles B. McVey, Ella M. Atkins, Edmund H. Durfee...
SWAP
2007
13 years 9 months ago
Some Experiments on the Usage of a Deductive Database for RDFS Querying and Reasoning
Abstract. Ontologies are pervading many areas of knowledge representation and management. To date, most research efforts have been spent on the development of sufficiently express...
Giovambattista Ianni, Alessandra Martello, Claudio...
WCE
2007
13 years 9 months ago
A Performance Based Evaluation of SIP Signalling across Converged Networks
—As wireless networks evolves towards the 3G and 4G architectures the mobile core networks provides a platform for all-IP convergence of mobile and fixed networks allowing for be...
Adetola Oredope, Antonio Liotta
SIGCOMM
2010
ACM
13 years 8 months ago
QuagFlow: partnering Quagga with OpenFlow
Computing history has shown that open, multi-layer hardware and software stacks encourage innovation and bring costs down. Only recently this trend is meeting the networking world...
Marcelo Ribeiro Nascimento, Christian Esteve Rothe...
COMCOM
2010
133views more  COMCOM 2010»
13 years 7 months ago
Supporting mobility in an IMS-based P2P IPTV service: A proactive context transfer mechanism
In recent years, IPTV has received an increasing amount of interest from the industry, commercial providers and the research community, alike. In this context, standardization bod...
Iván Vidal, Jaime García-Reinoso, An...