Sciweavers

9503 search results - page 48 / 1901
» Authenticated System Calls
Sort
View
HASKELL
2009
ACM
15 years 11 months ago
Types are calling conventions
It is common for compilers to derive the calling convention of a function from its type. Doing so is simple and modular but misses many optimisation opportunities, particularly in...
Maximilian C. Bolingbroke, Simon L. Peyton Jones
AICT
2008
IEEE
131views Communications» more  AICT 2008»
15 years 11 months ago
On the Handoff-Call Blocking Probability Calculation in W-CDMA Cellular Networks
In this paper, we investigate the call blocking probability calculations in the uplink of W-CDMA mobile cellular networks. In these networks, we distinguish two types of blocking,...
Vassilios G. Vassilakis, Georgios A. Kallos, Ioann...
IATA
1999
Springer
15 years 8 months ago
Market-Based Call Routing in Telecommunications Networks Using Adaptive Pricing and Real Bidding
We present a market-based approach to call routing in telecommunications networks. A system architecture is described that allows self-interested agents, representing various netwo...
M. A. Gibney, Nicholas R. Jennings, N. J. Vriend, ...
PSLS
1995
15 years 8 months ago
Lazy Remote Procedure Call and its Implementation in a Parallel Variant of C
Abstract. Lazy task creation (LTC) is an e cient approach for executing divide and conquer parallel programs that has been used in the implementation of Multilisp's future con...
Marc Feeley
CIKM
2008
Springer
15 years 6 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...