Sciweavers

2199 search results - page 88 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 6 months ago
WebProfiles: A Negotiation Model for User Awareness in Personal Area Networks
Automatic adaptation of the environment to user preferences results in personalized ambients that fulfill user interaction requirements in a more suitable way. However, the proble...
Juan Ignacio Vázquez, Diego López de...
ISORC
2005
IEEE
15 years 6 months ago
Automated Model Checking and Testing for Composite Web Services
Web Services form a new distributed computing paradigm. Collaborative verification and validation are important when Web Services from different vendors are integrated together to...
Hai Huang, Wei-Tek Tsai, Raymond A. Paul, Yinong C...
NOSSDAV
1992
Springer
15 years 4 months ago
Adaptive, Best-Effort Delivery of Digital Audio and Video Across Packet-Switched Networks
: We present an overview of a "best-effort" transport protocol that supports conferencing with digital audio and video across interconnected packet switched networks. The...
Kevin Jeffay, Donald L. Stone, Terry Talley, F. Do...
JHSN
2006
267views more  JHSN 2006»
15 years 18 days ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
112
Voted
ICDCS
2003
IEEE
15 years 6 months ago
QoS-Assured Service Composition in Managed Service Overlay Networks
Many value-added and content delivery services are being offered via service level agreements (SLAs). These services can be interconnected to form a service overlay network (SON) ...
Xiaohui Gu, Klara Nahrstedt, Rong N. Chang, Christ...