Sciweavers

2454 search results - page 456 / 491
» Privacy in the Information and Communications Technologies
Sort
View
WWIC
2005
Springer
147views Communications» more  WWIC 2005»
15 years 3 months ago
Location Assisted Fast Vertical Handover for UMTS/WLAN Overlay Networks
UMTS/WLAN integration offers considerable benefits for the users as well as for the mobile network. As soon as coverage is available, a mobile user should be able to switch seamle...
Tom Van Leeuwen, Ingrid Moerman, Bart Dhoedt, Piet...
CAISE
2004
Springer
15 years 3 months ago
Enabling Personalized Composition and Adaptive Provisioning of Web Services
Abstract. The proliferation of interconnected computing devices is fostering the emergence of environments where Web services made available to mobile users are a commodity. Unfort...
Quan Z. Sheng, Boualem Benatallah, Zakaria Maamar,...
SIGCOMM
2003
ACM
15 years 3 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
CAISE
2003
Springer
15 years 2 months ago
OMNIX: A Topology-Independent P2P Middleware
Peer-to-Peer (P2P) computing has been increasingly gaining interest. P2P architectures are no longer just used for sharing music files over the InP2P middleware systems attempt to...
Roman Kurmanowytsch, Engin Kirda, Clemens Kerer, S...
RIDE
1999
IEEE
15 years 2 months ago
Specification of Cooperative Constraints in Virtual Enterprise Workflow
Workflow systems are an emerging technology which have become increasingly important in the drive for business to provide better services and increase productivity. Intuitively, w...
Anne H. H. Ngu