Sciweavers

57 search results - page 10 / 12
» Interactive Credential Negotiation for Stateful Business Pro...
Sort
View
SRDS
2010
IEEE
14 years 9 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
ICC
2008
IEEE
146views Communications» more  ICC 2008»
15 years 6 months ago
APOS: Adaptive Parameters Optimization Scheme for Voice over IEEE 802.11g
—In this paper we present APOS, a method for dynamically adapting the parameters of IEEE 802.11g to the estimated system state, with the aim of enhancing the quality of a voice c...
Nicola Baldo, Federico Maguolo, Simone Merlin, And...
TREC
2008
15 years 1 months ago
TREC 2008 at the University at Buffalo: Legal and Blog Track
In the TREC 2008, the team from the State University of New York at Buffalo participated in the Legal track and the Blog track. For the Legal track, we worked on the interactive s...
Jianqiang Wang, Ying Sun, Omar Mukhtar, Rohini K. ...
DFN
2004
15 years 1 months ago
Workflow Management for Grid Computing - A Grid Workflow Infrastructure
: In this paper we propose a Grid Workflow Infrastructure, which serves as the base for specifying and executing collaborative interactive workflows within computational grids. The...
Dieter Cybok
WSC
2000
15 years 29 days ago
Optimizing production work flow using OpEMCSS
A graphical discrete event simulation library is proposed for system simulation that is based on interacting concurrent processes. This library works with EXTEND (Imagine That Inc...
John R. Clymer