Sciweavers

548 search results - page 85 / 110
» An authorization and access control scheme for pervasive com...
Sort
View
NDSS
2006
IEEE
14 years 3 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
DIALM
2004
ACM
161views Algorithms» more  DIALM 2004»
14 years 23 days ago
Batch conflict resolution algorithm with progressively accurate multiplicity estimation
The wireless connectivity, essential for pervasive computing, has ephemeral character and can be used for creating ad hoc networks, sensor networks, connection with RFID tags etc....
Petar Popovski, Frank H. P. Fitzek, Ramjee Prasad
INFOCOM
2002
IEEE
14 years 2 months ago
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement
IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the I...
Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, ...
WWW
2008
ACM
14 years 9 months ago
Privacy-enhanced sharing of personal content on the web
Publishing personal content on the web is gaining increased popularity with dramatic growth in social networking websites, and availability of cheap personal domain names and host...
Mohammad Mannan, Paul C. van Oorschot
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 3 months ago
Network-Wide Resource Optimization of Wireless OFDMA Mesh Networks with Multiple Radios
— We consider the problem of joint end-to-end rate optimization and radio resource management in wireless OFDMA-based mesh networks. Radio units equipped with multiple radio inte...
Pablo Soldati, Mikael Johansson