Sciweavers

653 search results - page 39 / 131
» Addressing interoperability issues in access control models
Sort
View
PCI
2001
Springer
14 years 13 days ago
A Knowledge Based Approach on Educational Metadata Use
One of the most rapidly evolving e-services is e-Learning, that is, the creation of advanced educational resources that are accessible on-line and, potentially, offer numerous adva...
Fotis Kokkoras, Demetrios G. Sampson, Ioannis P. V...
IJNSEC
2006
88views more  IJNSEC 2006»
13 years 8 months ago
Secure Internet Applications Based on Mobile Agents
The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server mo...
Cungang Yang
CCS
2010
ACM
13 years 8 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ICC
2008
IEEE
133views Communications» more  ICC 2008»
14 years 2 months ago
Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks
Abstract—Wireless mesh network (WMN) has emerged recently as a promising technology for next-generation wireless networking. In WMN, it is important to provide an efficient hand...
Bo Rong, Yi Qian, Kejie Lu, Michel Kadoch
ICMCS
2000
IEEE
84views Multimedia» more  ICMCS 2000»
14 years 12 days ago
Multi-modal Interaction in the Age of Information Appliances
The coming millenium will be characterized by the availability of multiple information appliances that make ubiquitous information access an accepted fact of life. The ability to ...
Stéphane H. Maes, T. V. Raman