Sciweavers

4447 search results - page 768 / 890
» Service Interaction Patterns
Sort
View
COMPSAC
2008
IEEE
15 years 11 months ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu
ICC
2008
IEEE
146views Communications» more  ICC 2008»
15 years 11 months ago
APOS: Adaptive Parameters Optimization Scheme for Voice over IEEE 802.11g
—In this paper we present APOS, a method for dynamically adapting the parameters of IEEE 802.11g to the estimated system state, with the aim of enhancing the quality of a voice c...
Nicola Baldo, Federico Maguolo, Simone Merlin, And...
IEEEARES
2008
IEEE
15 years 11 months ago
Context Ontology for Secure Interoperability
During interoperability exchanges, organizations are jointly conducting computation and sharing tasks. However, organizations can have different security policies. To guarantee g...
Céline Coma, Nora Cuppens-Boulahia, Fr&eacu...
NOMS
2008
IEEE
15 years 11 months ago
Dynamic inter-organizational cooperation setup in Circle-of-Trust environments
—The need for collaborative service provisioning across different providers’ domains is being addressed by Circles of Trust (CoT), whose members adhere to the same policies and...
Latifa Boursas, Vitalian A. Danciu
153
Voted
VTC
2008
IEEE
173views Communications» more  VTC 2008»
15 years 11 months ago
A Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks
Abstract—Cross-layer routing and scheduling algorithms design for wireless backhaul mesh network has attracted much research interest recently. The network is expected to support...
Chi Harold Liu, Athanasios Gkelias, Kin K. Leung