Sciweavers

FIW
2007
120views Communications» more  FIW 2007»
14 years 1 months ago
How to Guarantee Service Cooperation in Dynamic Environments?
The rise of communicating devices has led to more and more machine to machine applications. In this context devices can be modeled using serviceoriented computing. Furthermore serv...
Lionel Touseau
FIW
2007
133views Communications» more  FIW 2007»
14 years 1 months ago
Conflict Detection in Call Control Using First-Order Logic Model Checking
Feature interaction detection methods, whether online or offline, depend on previous knowledge of conflicts between the actions executed by the features. This knowledge is usually ...
Ahmed F. Layouni, Luigi Logrippo, Kenneth J. Turne...
FIW
2007
152views Communications» more  FIW 2007»
14 years 1 months ago
Considering Safety and Feature Interactions for Integrated Services of Home Network System
Assuring safety in the home network system (HNS) is a crucial issue to guarantee high quality of life. In this position paper, we first review our previous work, formulating three...
Ben Yan
CIC
2008
145views Communications» more  CIC 2008»
14 years 1 months ago
The Telematics Contents Providing System Based on a User's Request Using DMB Network
Oh-Cheon Kwon, Jong-Woo Choi, Moonsoo Lee, Hyun Su...
CIIT
2007
133views Communications» more  CIIT 2007»
14 years 1 months ago
A massively scalable persistent content distribution system
Jani Peltotalo, Sami Peltotalo, Alex Jantunen, Las...
CIIT
2007
195views Communications» more  CIIT 2007»
14 years 1 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
CIIT
2007
131views Communications» more  CIIT 2007»
14 years 1 months ago
Intra-federation credential negotiation based on individualized release strategy
In federated world like Shibboleth the release policy- how a member’s personal information to be divulged is set by their home organization. The member has little say in it. In ...
Javed I. Khan, Kailas B. Bobade, Manas Hardas
CIIT
2007
133views Communications» more  CIIT 2007»
14 years 1 months ago
Linear-tree rule structure for firewall optimization
Given a list of filtering rules with individual hitting probabilities, it is known that the average processing time of a linear-search based firewall can be minimized by searchi...
Liang Zhao, A. Shimae, Hiroshi Nagamochi
CIIT
2007
133views Communications» more  CIIT 2007»
14 years 1 months ago
A unified interface for visual and interactive web search
The interfaces used by the top Web search engines have changed very little since the early days of Web search. These interfaces follow the traditional model of information retriev...
Orland Hoeber, Xue Dong Yang
CIIT
2007
168views Communications» more  CIIT 2007»
14 years 1 months ago
Link dynamic and mobility measure of a manet with the brownian mobility model
To characterize the behavior of a mobile ad-hoc network (MANET), the Brownian mobility model is studied, where the random coordinators of mobile nodes are modeled by the Brownian ...
Yawgeng A. Chau, Yao-Hua Chen