Sciweavers

1642 search results - page 232 / 329
» Systemic Service Design: Aligning Value and Implementation
Sort
View
MHCI
2009
Springer
15 years 6 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
DAIS
2009
15 years 29 days ago
Exploiting Synergies between Coexisting Overlays
Overlay networks have emerged as a powerful paradigm to realise a large range of distributed services. However, as the number of overlays grows and the systems that use them become...
Shen Lin 0003, François Taïani, Gordon...
ICPP
2006
IEEE
15 years 6 months ago
A PROactive Request Distribution (PRORD) Using Web Log Mining in a Cluster-Based Web Server
Widely adopted distributor-based systems forward user requests to a balanced set of waiting servers in complete transparency to the users. The policy employed in forwarding reques...
Heung Ki Lee, Gopinath Vageesan, Ki Hwan Yum, Eun ...
CIMCA
2005
IEEE
15 years 1 months ago
Customised Customer Support Using a Soft Computing Approach
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...
MOBICOM
2003
ACM
15 years 5 months ago
Manycast: exploring the space between anycast and multicast in ad hoc networks
The characteristics of ad hoc networks naturally encourage the deployment of distributed services. Although current networks implement group communication methods, they do not sup...
Casey Carter, Seung Yi, Prashant Ratanchandani, Ro...