Sciweavers

438 search results - page 56 / 88
» Activity-based Access Control Model to Hospital Information
Sort
View
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 2 months ago
Cross-Layer Optimization With Model-Based Parameter Exchange
— Cross-layer optimization (CLO) promises significant gains in comparison to a conventional system design, which does not allow for information exchange across layers. One of th...
Andreas Saul, Shoaib Khan, Gunther Auer, Wolfgang ...
IDMS
1997
Springer
182views Multimedia» more  IDMS 1997»
14 years 20 days ago
mTunnel: A Multicast Tunneling System with a User Based Quality-of-Service Model
Abstract. This paper presents a system, called mTunnel, for application level tunneling of multicast trac in a lightweight manner, where the end-user is responsible for deciding w...
Peter Parnes, Kåre Synnes, Dick Schefstr&oum...
COMPSAC
2006
IEEE
14 years 2 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
ERCIMDL
2010
Springer
151views Education» more  ERCIMDL 2010»
13 years 9 months ago
DiLiA - The Digital Library Assistant
In this paper we present the digital library assistant (DiLiA). The system aims at augmenting the search in digital libraries in several dimensions. In the project advanced informa...
Kathrin Eichler, Holmer Hemsen, Günter Neuman...
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
14 years 11 days ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego