Sciweavers

5101 search results - page 163 / 1021
» Capturing Context Requirements
Sort
View
SASN
2004
ACM
14 years 1 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
IEEEARES
2010
IEEE
14 years 1 months ago
Architecture-Aware Adaptive Deployment of Contextual Security Policies
—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accura...
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
EDO
2000
Springer
13 years 11 months ago
Towards Designing Distributed Systems with ConDIL
Abstract Designing and maintaining a distributed system requires consideration of dependencies and invariants in the system's model. This paper suggests expressing distributio...
Felix Bübl
OAS
2003
13 years 9 months ago
Using OWL in a Pervasive Computing Broker
Computing is moving toward a pervasive context-aware environment in which agents with limited resources will require external support to help them become context-aware. In this pa...
Harry Chen, Timothy W. Finin, Anupam Joshi
PODS
2009
ACM
86views Database» more  PODS 2009»
14 years 8 months ago
Reverse data exchange: coping with nulls
An inverse of a schema mapping M is intended to "undo" what M does, thus providing a way to perform "reverse" data exchange. In recent years, three different f...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...