Sciweavers

26 search results - page 5 / 6
» Towards a Stochastic Model for Integrated Security and Depen...
Sort
View
JNW
2007
113views more  JNW 2007»
13 years 6 months ago
Using Virtualization to Provide Interdomain QoS-enabled Routing
— Today, the most important aspect related with the Internet architecture is its ossification representing the difficulties to introduce evolutions in the architecture as a way...
Fábio Luciano Verdi, Maurício F. Mag...
NIPS
2000
13 years 7 months ago
Discovering Hidden Variables: A Structure-Based Approach
A serious problem in learning probabilistic models is the presence of hidden variables. These variables are not observed, yet interact with several of the observed variables. As s...
Gal Elidan, Noam Lotner, Nir Friedman, Daphne Koll...
ANSOFT
2002
171views more  ANSOFT 2002»
13 years 6 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
LCN
2000
IEEE
13 years 10 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
IAJIT
2011
12 years 9 months ago
An RFID-based validation system for halal food
: In recent years, Muslims have depended on the Halal logo, displayed on food packaging, to indicate that the products are prepared according to Halal precepts. As laid out in the ...
Mohd Nasir, Azah Norman, Shukor Fauzi, Masliyana A...