Sciweavers

283 search results - page 37 / 57
» Soft computing techniques for web services brokering
Sort
View
VTC
2007
IEEE
136views Communications» more  VTC 2007»
15 years 3 months ago
LDPC-Coded HARQ Throughput Performance of MC-CDMA Using ICI Cancellation
—Broadband packet data services are demanded in the next generation mobile communications systems. Multi-carrier CDMA (MC-CDMA) is considered to be a promising wireless technique...
Kaoru Fukuda, Akinori Nakajima, Fumiyuki Adachi
JCM
2007
76views more  JCM 2007»
14 years 9 months ago
On the Tradeoff Between Blocking and Dropping Probabilities in Multi-cell CDMA Networks
— This paper is a sequel of previous work, in which we proposed a model and computational technique to calculate the Erlang capacity of a single CDMA cell that supports elastic s...
Gábor Fodor, Miklós Telek
SACMAT
2011
ACM
14 years 14 days ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
IEEESCC
2008
IEEE
15 years 4 months ago
Adaptive Secure Access to Remote Services
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RP...
Hanping Lufei, Weisong Shi, Vipin Chaudhary
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 3 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot