Sciweavers

90 search results - page 14 / 18
» New Model and Scheduling Protocol for Transactional Workflow...
Sort
View
ICCCN
2008
IEEE
15 years 6 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
14 years 9 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
PERCOM
2006
ACM
15 years 11 months ago
On the Fly Service Composition for Local Interaction Environments
Dynamically creating new, composite services "on the fly" using existing ones in a local interaction environment (e.g. a home, meeting room, airport lounge, etc.) presen...
Hossein Pourreza, Peter Graham
BIOWIRE
2007
Springer
15 years 5 months ago
Phase Patterns of Coupled Oscillators with Application to Wireless Communication
Abstract. Here we study the plausibility of a phase oscillators dynamical model for time division for multiple access in wireless communication networks. We show that emerging patt...
Albert Díaz-Guilera, Alex Arenas
HICSS
2009
IEEE
116views Biometrics» more  HICSS 2009»
15 years 6 months ago
Systems Modeling for IP-Based Handoff Using Timed Petri Nets
The mechanisms and design principles needed for achieving optimized handoff for mobile Internet services are poorly understood and need better analysis. This paper contributes to ...
Ashutosh Dutta, Bryan Lyles, Henning Schulzrinne, ...