Sciweavers

10625 search results - page 1843 / 2125
» Supporting delay-intolerant applications
Sort
View
CSFW
2008
IEEE
15 years 5 months ago
Language Based Secure Communication
Secure communication in distributed systems is notoriously hard to achieve due to the variety of attacks an adversary can mount, based on message interception, modification, redi...
Michele Bugliesi, Riccardo Focardi
ECRTS
2008
IEEE
15 years 5 months ago
Backlog Estimation and Management for Real-Time Data Services
Real-time data services can benefit data-intensive real-time applications, e.g., e-commerce, via timely transaction processing using fresh data, e.g., the current stock prices. T...
Kyoung-Don Kang, Jisu Oh, Yan Zhou
EDOC
2008
IEEE
15 years 5 months ago
Managing the Life Cycle of Access Rules in CEOSIS
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Stefanie Rinderle-Ma, Manfred Reichert
EIT
2008
IEEE
15 years 5 months ago
Defending selective forwarding attacks in WMNs
—Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supp...
Devu Manikantan Shila, Tricha Anjali
FGR
2008
IEEE
115views Biometrics» more  FGR 2008»
15 years 5 months ago
Meeting behavior detection in smart environments: Nonverbal cues that help to obtain natural interaction
Unobtrusive and multiple-sensor interfaces enable observation of natural human behavior in smart environments. Being able to detect, analyze and interpret this activity allows for...
Mannes Poel, Ronald Poppe, Anton Nijholt
« Prev « First page 1843 / 2125 Last » Next »