Sciweavers

9503 search results - page 37 / 1901
» Authenticated System Calls
Sort
View
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
14 years 7 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
NETWORKING
2004
15 years 5 months ago
Call-Burst Blocking Probabilities of ON-OFF Traffic Sources under the Bandwidth Reservation Policy
Abstract. We calculate call and burst blocking probabilities (CBP and BBP respectively) in a single link loss system accommodating service-classes of ONOFF traffic calls, either of...
Ioannis D. Moscholios, Michael D. Logothetis
IPCCC
2006
IEEE
15 years 10 months ago
A TCP-aware call admission control scheme for packet-switched wireless networks
Traditional Call Admission Control (CAC) schemes only consider call-level performance and are believed to be sufficient for the circuit-switched wireless network. Since the future...
Xinbing Wang, Do Young Eun, Wenye Wang
POLICY
2007
Springer
15 years 10 months ago
Call Management Policy Specification for the Asterisk Telephone Private Branch Exchange
A VoIP PBX supports flexible call handling functionality for selective forwarding, cost based outward call routing, recording calls etc. Both users and administrators need a flexi...
George Konstantoulakis, Morris Sloman
WSC
2007
15 years 6 months ago
Using simulation to predict market behavior for outbound call centers
In the last few years, the call center industry has considerably grown especially the outbound call center area, such as telemarketing. The productivity of the call centers has si...
Paulo J. de Freitas Filho, Geovani Ferreira da Cru...