Sciweavers

1386 search results - page 220 / 278
» Towards mature IT services
Sort
View
COMSWARE
2008
IEEE
15 years 6 months ago
Experimental analysis of RSSI-based location estimation in wireless sensor networks
—With a widespread increase in the number of mobile wireless systems and applications, the need for location aware services has risen at a very high pace in the last few years. M...
Mohit Saxena, Puneet Gupta, Bijendra N. Jain
ESCIENCE
2007
IEEE
15 years 6 months ago
Tracing Resource Usage over Heterogeneous Grid Platforms: A Prototype RUS Interface for DGAS
Tracing resource usage by Grid users is of utmost importance — especially in the context of large-scale scientific collaborations such as within the High Energy Physics (HEP) c...
Rosario M. Piro, Michele Pace, Antonia Ghiselli, A...
IEEEARES
2007
IEEE
15 years 6 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
EUC
2007
Springer
15 years 6 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
GLOBECOM
2006
IEEE
15 years 5 months ago
Analysis of Unfairness between TCP Uplink and Downlink Flows in Wi-Fi Hot Spots
Abstract— This paper focuses on the unfairness problem between TCP uplink and downlink flows in the 802.11 Wi-Fi hot spots and shows that the service is prone to be unfair. The ...
Eun-Chan Park, Dong-Young Kim, Chong-Ho Choi