Access control to sensitive resources in pervasive computing needs to take uncertainty into account. Previous research has developed uncertainty-aware access-control models for en...
— With the advent of cognitive radio technology, new paradigms for spectrum access can achieve near-optimal spectrum utilization by letting users sense and utilize available spec...
We address the problem of secure remote access to a site's internal web server from outside the rewall. The goal is to give authorized users access to sensitive information, ...
Christian Gilmore, David P. Kormann, Aviel D. Rubi...
We use game theorectic models to show the lack of incentives in the TCP congestion avoidance algorithm and the consequential systemwide network problems. We then propose a Vickery-...
The network of excellence HUMAINE is currently making a co-ordinated, interdisciplinary effort to develop a consistent view on emotion-oriented computing. This overview paper prop...