Sciweavers

9503 search results - page 21 / 1901
» Authenticated System Calls
Sort
View
JCIT
2010
162views more  JCIT 2010»
14 years 6 months ago
Call Admission Control Strategy for System Throughput Maximization Using DOVE
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 4 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
MUE
2008
IEEE
122views Multimedia» more  MUE 2008»
15 years 6 months ago
ACE: Active Emergence Call Service System for u-Lifecare
This paper establishes ACE system that supports active emergency call service. ACE system is physically composed of E-Device (Emergency Mobile Device) for the handicapped, single ...
Won-Hee Han, Eun-Ha Song, Laurence Tianruo Yang, J...
COMCOM
2000
130views more  COMCOM 2000»
14 years 11 months ago
Use Case Maps and LOTOS for the prototyping and validation of a mobile group call system
ABSTRACT -- SPEC-VALUE, a rigorous scenario-driven approach for the description and validation of complex system functionalities at the early stages of design, is presented. It is ...
Daniel Amyot, Luigi Logrippo
SRDS
2006
IEEE
15 years 5 months ago
Call Availability Prediction in a Telecommunication System: A Data Driven Empirical Approach
Availability prediction in a telecommunication system plays a crucial role in its management, either by alerting the operator to potential failures or by proactively initiating pr...
Günther A. Hoffmann, Miroslaw Malek