Sciweavers

2454 search results - page 379 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ICC
2007
IEEE
15 years 4 months ago
A Support System for Designing Ubiquitous Service Composition Scenarios
—Ubiquitous service composition provides new services and applications seamlessly by establishing cooperation among any devices in home networks and any services in service provi...
Takaaki Moriya, Hiroyuki Ohnishi, Makoto Yoshida, ...
INFOCOM
2007
IEEE
15 years 4 months ago
Distributed Low-Complexity Maximum-Throughput Scheduling for Wireless Backhaul Networks
— We introduce a low-complexity distributed slotted MAC protocol that can support all feasible arrival rates in a wireless backhaul network (WBN). For arbitrary wireless networks...
Abdul Kader Kabbani, Theodoros Salonidis, Edward W...
QUATIC
2007
IEEE
15 years 4 months ago
MPS Model-Based Software Acquisition Process Improvement in Brazil
This paper describes an initiative to improve software acquisition process in Brazil. This initiative was conducted in the context of the MPS.BR Program, a nationwide effort to de...
Kival Chaves Weber, Eratostenes Edson Ramalho de A...
IV
2005
IEEE
134views Visualization» more  IV 2005»
15 years 3 months ago
Automatic Layout of Project Plans Using a Metro Map Metaphor
In this paper we describe a tool to improve interfunctional communication of project plans by displaying them as a metro map. Our tool automatically lays out plans using a multicr...
Jonathan M. Stott, Peter Rodgers, Remo Aslak Burkh...
IWIA
2005
IEEE
15 years 3 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...