Sciweavers

640 search results - page 51 / 128
» Access Control for Active Spaces
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 3 months ago
AMAC: Traffic-Adaptive Sensor Network MAC Protocol through Variable Duty-Cycle Operations
—Sensor network MAC protocols usually employ periodic sleep and wakeup, achieving low duty-cycle to save energy and to increase the lifetime of battery-powered sensor devices. Ho...
Sang Hoon Lee, Joon Ho Park, Lynn Choi
IEEEPACT
2009
IEEE
14 years 3 months ago
Soft-OLP: Improving Hardware Cache Performance through Software-Controlled Object-Level Partitioning
—Performance degradation of memory-intensive programs caused by the LRU policy’s inability to handle weaklocality data accesses in the last level cache is increasingly serious ...
Qingda Lu, Jiang Lin, Xiaoning Ding, Zhao Zhang, X...
APNOMS
2006
Springer
14 years 17 days ago
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments
For an efficient role based access control using attribute certificate in highly distributed computing environments, we use a technique of structuring role specification certificat...
Soomi Yang
CEC
2009
IEEE
14 years 3 months ago
Evolving morphology and control: A distributed approach
—In this paper we present a model which allows to co-evolve the morphology and the control system of realistically simulated robots (creatures). The method proposed is based on a...
Mariagiovanna Mazzapioda, Angelo Cangelosi, Stefan...
DOA
2001
117views more  DOA 2001»
13 years 10 months ago
Developing Mobile Agent Organizations: A Case Study in Digital Tourism
Mobile agents are a useful paradigm for the development of complex Internet applications. However, the effective development of mobile agent applications requires suitable models ...
Franco Zambonelli, Giacomo Cabri, Letizia Leonardi