Sciweavers

1587 search results - page 255 / 318
» Access Control for Shared Resources
Sort
View
SAINT
2005
IEEE
15 years 10 months ago
Adaptive Semantic Support Provisioning in Mobile Internet Environments
The Mobile Internet scenario encourages the design and development of context-aware applications that provide results depending on context information, such as the relative positi...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
FODO
1993
Springer
110views Algorithms» more  FODO 1993»
15 years 8 months ago
Storage System Architectures for Continuous Media Data
Abstract. Data storage systems are being called on to manage continuous media data types, such as digital audio and video. There is a demand by applications for \constrained-latenc...
David Maier, Jonathan Walpole, Richard Staehli
SOSP
2003
ACM
16 years 1 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz
ADHOCNOW
2005
Springer
15 years 10 months ago
Probability Distributions for Channel Utilisation
Sensor nets have many undisputed fields of application. A paradigm of communication is the use of one control channel in the MAC layer. We challenge this paradigm for nodes with v...
Christian Schindelhauer, Kerstin Voß
WICSA
2004
15 years 5 months ago
The DiPS+ Software Architecture for Self-healing Protocol Stacks
Research domains such as active networks, ad-hoc networks, ubiquitous computing, pervasive computing, grid computing, and sensor networks, clearly show that computer networks will...
Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre...