Sciweavers

3031 search results - page 269 / 607
» SNMS - Shadow Network Management System
Sort
View
139
Voted
IAT
2006
IEEE
15 years 11 months ago
Mobile Agent Architecture Integration for a Wireless Sensor Medical Application
Wireless sensor nodes are used to monitor patient vital signs in a medical application. To ensure proper patient care is provided, real-time patient data must be managed correctly...
John Herbert, John O'Donoghue, Gao Ling, Kai Fei, ...
POLICY
2001
Springer
15 years 9 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
KIVS
2007
Springer
15 years 11 months ago
Semantic Integration of Identity Data Repositories
Abstract. With the continuously growing number of distributed and heterogeneous IT systems there is the need for structured and efficient identity management (IdM) processes. This ...
Christian Emig, Kim Langer, Jürgen Biermann, ...
138
Voted
NETGAMES
2004
ACM
15 years 10 months ago
Implementation of a service platform for online games
Large-scale multiplayer online games require considerable investment in hosting infrastructures. However, the difficulty of predicting the success of a new title makes investing ...
Anees Shaikh, Sambit Sahu, Marcel-Catalin Rosu, Mi...
AINA
2011
IEEE
14 years 8 months ago
Non-invasive Browser Based User Modeling Towards Semantically Enhanced Personlization of the Open Web
—Currently the user’s web search is disjoint from the resources which is subsequently browsed. Specifically the related instances of the search are not displayed on the followi...
Kevin Koidl, Owen Conlan, Lai Wei, Ann Marie Saxto...