Sciweavers

1438 search results - page 278 / 288
» Models for Trustworthy Service and Process Oriented Systems
Sort
View
JPDC
2007
117views more  JPDC 2007»
14 years 11 months ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
ICDE
2002
IEEE
149views Database» more  ICDE 2002»
16 years 1 months ago
Indexing Spatio-Temporal Data Warehouses
Spatio-temporal databases store information about the positions of individual objects over time. In many applications however, such as traffic supervision or mobile communication ...
Dimitris Papadias, Yufei Tao, Panos Kalnis, Jun Zh...
WWW
2009
ACM
16 years 10 days ago
Search shortcuts: driving users towards their goals
Giving suggestions to users of Web-based services is a common practice aimed at enhancing their navigation experience. Major Web Search Engines usually provide Suggestions under t...
Ranieri Baraglia, Fidel Cacheda, Victor Carneiro, ...
MOBIHOC
2009
ACM
16 years 6 days ago
Efficient resource management in OFDMA Femto cells
Femto cells are a cost-effective means of providing ubiquitous connectivity in future broadband wireless networks. While their primary purpose has been to improve coverage in curr...
Karthikeyan Sundaresan, Sampath Rangarajan
84
Voted
FASE
2009
Springer
15 years 6 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel