Sciweavers

706 search results - page 110 / 142
» Access Control: Policies, Models, and Mechanisms
Sort
View
SIMUTOOLS
2008
13 years 10 months ago
An 802.16 model for NS2 simulator with an integrated QoS architecture
The IEEE 802.16 technology is emerging as a promising solution for BWA due to its ability to support multimedia services and to operate in multiple physical environments. Also, wi...
Ikbal Chammakhi Msadaa, Fethi Filali, Farouk Kamou...
COMPSAC
2007
IEEE
14 years 3 months ago
An Adaptive Security Model for Multi-agent Systems and Application to a Clinical Trials Environment
We present in this paper an adaptive security model for Multi-agent systems. A security meta-model has been developed in which the traditional role concept has been extended. The ...
Liang Xiao 0002, Andrew Peet, Paul H. Lewis, Srina...
IJIEM
2007
113views more  IJIEM 2007»
13 years 8 months ago
Fairness concerns in digital right management models
: Digital piracy is threatening the global multimedia content industry and blindly applied coercive Digital Right Management (DRM) policies do nothing but legitimizing this piracy....
Luc Bouganim, Philippe Pucheral
ERCIMDL
2000
Springer
118views Education» more  ERCIMDL 2000»
14 years 11 days ago
Evaluating a User-Model Based Personalisation Architecture for Digital News Services
Abstract. An architecture that provides personalised filtering and dissemination of news items is presented. It is based on user profiles and it provides mechanisms that allow the ...
Alberto Díaz Esteban, Pablo Gervás G...
RTSS
1992
IEEE
14 years 25 days ago
Scheduling Sporadic Tasks with Shared Resources in Hard-Real-Time Systems
The problem of scheduling a set of sporadic tasks that share a set of serially reusable, single unit software resources on a single processor is considered. The correctness condit...
Kevin Jeffay