Sciweavers

367 search results - page 49 / 74
» An Approach to User Management of Broadband Services
Sort
View
CP
2010
Springer
13 years 6 months ago
Context-Sensitive Call Control Using Constraints and Rules
Personalisation and context-awareness are fundamental concerns in Telephony. This paper introduces a rule-based system - 4CRULES - which enables context-sensitive call control by t...
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
PERCOM
2007
ACM
14 years 7 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
CSREAPSC
2006
13 years 9 months ago
An Access Control Framework for Pervasive Computing Environments
Abstract. The explosive evolution of pervasive computing environments presents several new challenges such as smart spaces, invisibility, localized scalability, and masking uneven ...
Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
ICCS
2007
Springer
14 years 1 months ago
Middleware in Modern High Performance Computing System Architectures
A recent trend in modern high performance computing (HPC) system architectures employs “lean” compute nodes running a lightweight operating system (OS). Certain parts of the OS...
Christian Engelmann, Hong Ong, Stephen L. Scott
ISSADS
2004
Springer
14 years 1 months ago
Evaluating Location Dependent Queries Using ISLANDS
The recent emergence of handheld devices and wireless networks has implied an exponential increase of terminals users. So, today, service providers have to propose new application...
Marie Thilliez, Thierry Delot