Sciweavers

1967 search results - page 311 / 394
» Performance Management for Cluster Based Web Services
Sort
View
ACSAC
2007
IEEE
15 years 4 months ago
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
The growth of the applications and services market for mobile devices is currently slowed down by the lack of a flexible and reliable security infrastructure. The development and...
Iulia Ion, Boris Dragovic, Bruno Crispo
CIVR
2007
Springer
112views Image Analysis» more  CIVR 2007»
15 years 4 months ago
Practice and challenges in trademark image retrieval
In this paper, we outline some of the main challenges facing trademark searchers today, and discuss the extent to which current automated systems are meeting those challenges. Cat...
Jan Schietse, John P. Eakins, Remco C. Veltkamp
WIRTSCHAFTSINFORMATI
2007
14 years 11 months ago
Towards a Model-driven Development of Monitored Processes
An integrated management of business processes demands a strictly process-oriented development of the supporting IT. Process-orientation is especially promoted by Service-Oriented...
Christof Momm, Robert Malec, Sebastian Abeck
ECOOPW
1998
Springer
15 years 1 months ago
Role-Based Protection and Delegation for Mobile Object Environments
PrincipalDomain is an administrative scoping construct for establishing security policies based on the principals invoking object services that may entail objects moving around a ...
Nataraj Nagaratnam, Doug Lea
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 8 months ago
A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks
The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users...
H. S. Ramesh Babu, Gowrishankar, P. S. Satyanaraya...