Sciweavers

221 search results - page 23 / 45
» Model-based management of security services in complex netwo...
Sort
View
ISMIR
2004
Springer
176views Music» more  ISMIR 2004»
15 years 5 months ago
The International Music Information Retrieval Systems Evaluation Laboratory: Governance, Access and Security
The IMIRSEL (International Music Information Retrieval Systems Evaluation Laboratory) project provides an unprecedented platform for evaluating Music Information Retrieval (MIR) a...
J. Stephen Downie, Joe Futrelle, David K. Tcheng
CCS
2006
ACM
15 years 3 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
CONCURRENCY
2004
77views more  CONCURRENCY 2004»
14 years 11 months ago
Grids of agents for computer and telecommunication network management
The centralized system approach for computer and telecommunication network management has been presenting scalability problems along with the growth in the number and diversity of...
Marcos Dias de Assunção, Fernando Lu...
JUCS
2010
160views more  JUCS 2010»
14 years 10 months ago
LCP-Nets: A Linguistic Approach for Non-functional Preferences in a Semantic SOA Environment
Abstract: This paper addresses the problem of expressing preferences among nonfunctional properties of services in a Web service architecture. In such a context, semantic and non-f...
Pierre Châtel, Isis Truck, Jacques Malenfant
NETWORKING
2008
15 years 1 months ago
XIAN Automated Management and Nano-Protocol to Design Cross-Layer Metrics for Ad Hoc Networking
In the highly dynamic and unpredictable environment of MANETs, cross-layer design is receiving growing interest but lacks experimental validation tools. This paper presents XIAN (C...
Hervé Aïache, Vania Conan, Laure Lebru...