Sciweavers

618 search results - page 93 / 124
» An Approach to Discover Dependencies between Service Operati...
Sort
View
SACMAT
2005
ACM
15 years 3 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
67
Voted
COMPSAC
2009
IEEE
15 years 2 months ago
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems
—Countless challenges to preserving a user’s location privacy exist and have become more important than ever before with the proliferation of handheld devices and the pervasive...
Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Shar...
PERCOM
2010
ACM
14 years 8 months ago
Collaborative municipal Wi-Fi networks - challenges and opportunities
Abstract—Municipal Wi-Fi networks aim at providing Internet access and selected mobile network services to citizens, travelers, and civil servants. The goals of these networks ar...
Tobias Heer, René Hummen, Nicolai Viol, Han...
WOSP
2010
ACM
15 years 4 months ago
SLA-driven planning and optimization of enterprise applications
We propose a model-based methodology to size and plan enterprise applications under Service Level Agreements (SLAs). Our approach is illustrated using a real-world Enterprise Reso...
Hui Li, Giuliano Casale, Tariq N. Ellahi
ICCD
2005
IEEE
108views Hardware» more  ICCD 2005»
15 years 6 months ago
Methods for Modeling Resource Contention on Simultaneous Multithreading Processors
Simultaneous multithreading (SMT) seeks to improve the computation throughput of a processor core by sharing primary resources such as functional units, issue bandwidth, and cache...
Tipp Moseley, Dirk Grunwald, Joshua L. Kihm, Danie...