Sciweavers

JCIT
2010
162views more  JCIT 2010»
12 years 11 months ago
Call Admission Control Strategy for System Throughput Maximization Using DOVE
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...
DKE
2008
100views more  DKE 2008»
13 years 4 months ago
PeRSSonal's core functionality evaluation: Enhancing text labeling through personalized summaries
In this manuscript we present the summarization and categorization subsystems of a complete mechanism that begins with web-page fetching and concludes with representation of the c...
Christos Bouras, Vassilis Poulopoulos, Vassilis Ts...
IADIS
2003
13 years 5 months ago
Intelligent Agents for Quality of Service Evaluation in Multimedia Services
This paper explores the issues related to developing a transparent Quality of Service (QoS) evaluation for wireless services and distributed applications. The objective of the pap...
Augustin Radu, Geneviève Baudoin
CRIWG
2001
13 years 5 months ago
Evolution in Use of Groupware: Facilitating Tailoring to the Extreme
Group work evolves, often leading to changing requirements on the technical support. To meet these new requirements groupware has to be modified. A system that allows end users to...
Robert Slagter, Margit Biemans, G. Henri ter Hofte
MKWI
2008
126views Business» more  MKWI 2008»
13 years 5 months ago
Endbenutzergerechte Anpassung von serviceorientierten Softwaresystemen
Abstract: Anpassbarkeit ist ein wichtiges Qualit
Markus Hofmann, Benedikt Ley, Christian Dörne...
ICWS
2007
IEEE
13 years 5 months ago
A Query-based System for Automatic Invocation of Web Services
There is a critical need to design and develop tools tract away the fundamental complexity of XML based Web services specifications and toolkits, and provide an elegant, intuitive...
Chaitali Gupta, Rajdeep Bhowmik, Michael R. Head, ...
CHIMIT
2007
ACM
13 years 8 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
IPPS
2003
IEEE
13 years 9 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
LCN
2006
IEEE
13 years 10 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
ICMCS
2006
IEEE
133views Multimedia» more  ICMCS 2006»
13 years 10 months ago
A Priority-Based Adaptive Scheme for Wireless Multimedia Delivery
In wireless multimedia streaming, there is a need to allow for client prioritisation in order to enable provision of end user perceived quality in direct relationship with client ...
Edward Casey, Gabriel-Miro Muntean