Sciweavers

978 search results - page 183 / 196
» WiMAX networks: from access to service platform
Sort
View
ACSAC
2006
IEEE
15 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ICDCSW
2003
IEEE
15 years 2 months ago
Scaling Server Selection Using a Multi-Broker Architecture
Server replication is a common approach to improving the scalability of a service on the Internet. For this approach, the task of finding an appropriate server from a set of repli...
Mohamed-Vall O. Mohamed-Salem, Gregor von Bochmann...
ICIA
2007
14 years 12 months ago
Modeling Human-Agent Interaction with Active Ontologies
As computer systems continue to grow in power and access more networked content and services, we believe there will be an increasing need to provide more user-centric systems that...
Didier Guzzoni, Charles Baur, Adam Cheyer
74
Voted
IADIS
2003
14 years 11 months ago
Personalized Context-Aware Presentation of Information to Mobile Users
One of the major challenges facing information systems today is that of finding relevant information to satisfy a user's request and presenting it in a preferred form. The po...
M. Howard Williams, D. Halvatzaras, Lars Mehrmann
OSDI
1994
ACM
14 years 11 months ago
Lottery Scheduling: Flexible Proportional-Share Resource Management
This paper presents lottery scheduling, a novel randomized resource allocation mechanism. Lottery scheduling provides efficient, responsive control over the relative execution rat...
Carl A. Waldspurger, William E. Weihl