Sciweavers

9503 search results - page 38 / 1901
» Authenticated System Calls
Sort
View
AICT
2007
IEEE
113views Communications» more  AICT 2007»
15 years 10 months ago
Ontologies to Support Call Control Policies
—The topic of policy-based management is introduced. Its specific application by the ACCENT project to call control is then discussed. The APPEL policy language supports regular ...
Gemma A. Campbell, Kenneth J. Turner
IAT
2006
IEEE
15 years 10 months ago
A Call Handling Assistant for Mobile Devices
With the near ubiquity of mobile phones, people are reachable almost anywhere and at any time. The convenience this provides for people to more effectively combine different aspec...
Wayne Wobcke, Rita Chan, Andrew Limaru
NIPS
1998
15 years 5 months ago
Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model
Fraud causes substantial losses to telecommunication carriers. Detection systems which automatically detect illegal use of the network can be used to alleviate the problem. Previo...
Jaakko Hollmén, Volker Tresp
140
Voted
ICC
1997
IEEE
155views Communications» more  ICC 1997»
15 years 8 months ago
Design of Call Control Signaling in Wireless ATM Networks
: In this paper, a multiservice, local-area, wireless access ATM system is explored from a signaling protocol viewpoint. The signaling architecture considered here follows the sign...
Nikolaos H. Loukas, Nikos I. Passas, Lazaros F. Me...
SC
2009
ACM
15 years 9 months ago
Enhancing the earth system grid security infrastructure through single sign-on and autoprovisioning
In this paper, we discuss the recent ESG’s development and implementation efforts concerning its authentication infrastructure. ESG’s requirements are to make the user’s log...
Frank Siebenlist, Rachana Ananthakrishnan, David E...