Sciweavers

640 search results - page 66 / 128
» Access Control for Active Spaces
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
ICC
2009
IEEE
134views Communications» more  ICC 2009»
14 years 3 months ago
Voice Service Support over Cognitive Radio Networks
—In this paper, quality of service (QoS) provisioning for voice service over cognitive radio networks is considered. As voice traffic is sensitive to delay, the presence of prim...
Ping Wang, Dusit Niyato, Hai Jiang
CHI
2001
ACM
14 years 9 months ago
Partitioning digital worlds: focal and peripheral awareness in multiple monitor use
Software today does not help us partition our digital worlds effectively. We must organize them ourselves. This field study of users of multiple monitors examines how people with ...
Jonathan Grudin
TRIDENTCOM
2005
IEEE
14 years 2 months ago
Addressing Repeatability in Wireless Experiments using ORBIT Testbed
With the rapid growth in research activity on future wireless networking applications and protocols, experimental study and validation is becoming an increasingly important tool t...
Sachin Ganu, Haris Kremo, Richard E. Howard, Ivan ...
ECMDAFA
2006
Springer
136views Hardware» more  ECMDAFA 2006»
14 years 16 days ago
Finding a Path to Model Consistency
A core problem in Model Driven Engineering is model consistency achievement: all models must satisfy relationships constraining them. Active consistency techniques monitor and cont...
Gregory de Fombelle, Xavier Blanc, Laurent Rioux, ...