Sciweavers

490 search results - page 58 / 98
» Enabling User Control with Personal Identity Management
Sort
View
ICW
2005
IEEE
117views Communications» more  ICW 2005»
15 years 6 months ago
Implementation Issues of Managed Bandwidth Service: The Case of GRNET
This paper describes the design and the implementation of the Managed Bandwidth Service (MBS) in a high speed backbone network as well as a management tool for the service. The se...
Christos Bouras, Dimitris Primpas
100
Voted
CCS
2010
ACM
14 years 10 months ago
Adjustable autonomy for cross-domain entitlement decisions
Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially...
Jacob Beal, Jonathan Webb, Michael Atighetchi
86
Voted
JCDL
2006
ACM
71views Education» more  JCDL 2006»
15 years 6 months ago
Using controlled query generation to evaluate blind relevance feedback algorithms
Currently in document retrieval there are many algorithms each with different strengths and weakness. There is some difficulty, however, in evaluating the impact of the test quer...
Chris Jordan, Carolyn R. Watters, Qigang Gao
103
Voted
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 6 months ago
A Session-Initiation-Protocol-Based Middleware for Multi-Application Management
Abstract—The deployment of multimedia services in nextgeneration networks is a challenge due to the high configuration complexity of the streaming process in different stationary...
Teodora Guenkova-Luy, Holger Schmidt, Andreas Scho...
ATAL
2007
Springer
15 years 2 months ago
InterPol: a policy framework for managing trust and privacy in referral networks
Referral networks are a kind of P2P system consisting of autonomous agents who seek, provide services, or refer other service providers. Key applications include service discovery...
Yathiraj B. Udupi, Munindar P. Singh