Sciweavers

14424 search results - page 2683 / 2885
» Modeling Radio Networks
Sort
View
128
Voted
ACSAC
2003
IEEE
15 years 10 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
CODES
2003
IEEE
15 years 10 months ago
Synthesis of real-time embedded software with local and global deadlines
Current methods cannot synthesize real-time embedded software applications when the global deadline of a task is shorter than the total of all local deadlines along a critical pat...
Pao-Ann Hsiung, Cheng-Yi Lin
FTDCS
2003
IEEE
15 years 10 months ago
Dynamic Component Composition for Functionality Adaptation in Pervasive Environments
With the increasing prevalence of mobile devices, computing is being carried out on devices with varied resource constraints and is afflicted by constant changes in run-time conte...
Nalini Moti Belaramani, Cho-Li Wang, Francis C. M....
HICSS
2003
IEEE
168views Biometrics» more  HICSS 2003»
15 years 10 months ago
'Pay-per-use' Concept in Healthcare: A Grounded Theory Perspective
Healthcare organizations worldwide are faced with the growing challenge of introducing structural and technological reforms and cost-effective IT solutions that will transform the...
Abdullah A. Akbar
HPDC
2003
IEEE
15 years 10 months ago
Security for Grid Services
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations.” The dynamic and multi-institutional nature of ...
Von Welch, Frank Siebenlist, Ian T. Foster, John B...
« Prev « First page 2683 / 2885 Last » Next »