Sciweavers

1472 search results - page 87 / 295
» Access control in virtual environments
Sort
View
146
Voted
AINA
2007
IEEE
15 years 11 months ago
How to Study Wireless Mesh Networks: A hybrid Testbed Approach
— Simulation is the most famous way to study wireless an mobile networks since they offer a convenient combination of flexibility and controllability. However, their largest dis...
Alexander Zimmermann, Mesut Günes, Martin Wen...
VRML
2000
ACM
15 years 9 months ago
Using VRML in construction industry applications
This paper describes initial research using the Virtual Reality Modeling Language (VRML97) in construction industry applications. The modeling of steel structures and construction...
Robert Lipman, Kent Reed
SIGCOMM
2006
ACM
15 years 10 months ago
In VINI veritas: realistic and controlled network experimentation
This paper describes VINI, a virtual network infrastructure that allows network researchers to evaluate their protocols and services in a realistic environment that also provides ...
Andy C. Bavier, Nick Feamster, Mark Huang, Larry L...
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
15 years 10 months ago
Virtual Organizations as Normative Multiagent Systems
In this paper we propose a conceptual model of virtual organizations as normative multiagent systems. The dynamic aspects of virtual organizations are modeled using aspects of spe...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...
143
Voted
SUTC
2008
IEEE
15 years 11 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu