Sciweavers

534 search results - page 30 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
ESWS
2010
Springer
14 years 6 days ago
Reactive Policies for the Semantic Web
Semantic Web policies are general statements defining the behavior of a system that acts on behalf of real users. These policies have various applications ranging from dynamic age...
Piero A. Bonatti, Philipp Kärger, Daniel Olme...
NDSS
2000
IEEE
13 years 11 months ago
Accountability and Control of Process Creation in Metasystems
The distinguishing feature of a metasystem is middleware that facilitates viewing a collection of large, distributed, heterogeneous resources as a single virtual machine, where ea...
Marty Humphrey, Frederick Knabe, Adam Ferrari, And...
GLOBECOM
2008
IEEE
14 years 1 months ago
Joint Scheduling and Rate Control Algorithms for Stable Throughput Maximization under Channel Estimation in Single-Hop Wireless
—We characterize the stability region of wireless, single-hop networks with time-varying imperfect channels. We define a joint scheduling and transmission rate control policy th...
Anna Pantelidou, Anthony Ephremides
NDSS
2003
IEEE
14 years 20 days ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
GSN
2009
Springer
189views Sensor Networks» more  GSN 2009»
14 years 17 hour ago
Deploying a Wireless Sensor Network in Iceland
A wireless sensor network deployment on a glacier in Iceland is described. The system uses power management as well as power harvesting to provide long-term environment sensing. Ad...
Kirk Martinez, Jane K. Hart, Royan Ong