Sciweavers

9588 search results - page 1641 / 1918
» Service Value Networks
Sort
View
DSN
2002
IEEE
15 years 9 months ago
Transactional Rollback for Language-Based Systems
Language run-time systems are routinely used to host potentially buggy or malicious codelets — software modules, agents, applets, etc. — in a secure environment. A number of t...
Algis Rudys, Dan S. Wallach
INFOCOM
2002
IEEE
15 years 9 months ago
Performance Optimization of VoIP Calls over Wireless Links Using H.323 Protocol
—Intelligent mobile terminals (or users) of next generation wireless networks are expected to initiate voice over IP (VoIP) calls using session set-up protocols like H.323 or SIP...
Sajal K. Das, Sanjoy K. Sen, Naveen K. Kakani
NOMS
2002
IEEE
127views Communications» more  NOMS 2002»
15 years 9 months ago
Intelligent search of correlated alarms from database containing noise data
Alarm correlation plays an important role in improving the service and reliability in modern telecommunication networks. Most previous research of alarm correlation didn’t consi...
Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma
ERCIMDL
2001
Springer
171views Education» more  ERCIMDL 2001»
15 years 9 months ago
MARIAN: Flexible Interoperability for Federated Digital Libraries
Federated digital libraries are composed of distributed, autonomous, and often heterogeneous information services but provide users with a transparent, integrated view of collected...
Marcos André Gonçalves, Robert K. Fr...
FC
2001
Springer
123views Cryptology» more  FC 2001»
15 years 9 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
« Prev « First page 1641 / 1918 Last » Next »