Sciweavers

14824 search results - page 2752 / 2965
» Security - Introduction
Sort
View
NGC
2007
Springer
120views Communications» more  NGC 2007»
14 years 11 months ago
End-to-End QoS Support for a Medical Grid Service Infrastructure
Quality of Service support is an important prerequisite for the adoption of Grid technologies for medical applications. The GEMSS Grid infrastructure addressed this issue by offer...
Siegfried Benkner, Gerhard Engelbrecht, Stuart E. ...
PAMI
2007
150views more  PAMI 2007»
14 years 11 months ago
Continuous Verification Using Multimodal Biometrics
—Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the prote...
Terence Sim, Sheng Zhang, Rajkumar Janakiraman, Sa...
PE
2007
Springer
154views Optimization» more  PE 2007»
14 years 11 months ago
QoS management in service-oriented architectures
The next generation of software systems will be highly distributed, component-based and service-oriented. They will need to operate in unattended mode and possibly in hostile envi...
Daniel A. Menascé, Honglei Ruan, Hassan Gom...
SAC
2008
ACM
14 years 11 months ago
A pull-based e-mail architecture
Conventional e-mail systems are prone to problems that impact their scalability and dependability. E-mail systems operate following a "push-based" approach: the sender s...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
TKDE
2008
154views more  TKDE 2008»
14 years 11 months ago
Watermarking Relational Databases Using Optimization-Based Techniques
Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. In th...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
« Prev « First page 2752 / 2965 Last » Next »