Sciweavers

2436 search results - page 330 / 488
» Comonadic Notions of Computation
Sort
View
EUC
2008
Springer
15 years 6 months ago
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...
Omar Hasan, Jean-Marc Pierson, Lionel Brunie
149
Voted
EUC
2008
Springer
15 years 6 months ago
Trusted Spanning Tree for Delay Tolerant MANETs
Quality of service is an important issue in Delay Tolerant Mobile Ad-Hoc Networks (DTMs). This work attempts to improve the Quality of service (QoS) in DTMs by relying on spanning...
Apivadee Piyatumrong, Pascal Bouvry, Fréd&e...
159
Voted
FIS
2008
15 years 6 months ago
Towards an Ontological Foundation for Services Science
Most of the efforts conducted on services nowadays are focusing on aspects related to data and control flow, often disregarding the main goal of the future Internet of services, na...
Roberta Ferrario, Nicola Guarino
IMC
2007
ACM
15 years 6 months ago
Understanding handoffs in large ieee 802.11 wireless networks
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
AMW
2010
15 years 6 months ago
Logic Programs for Repairing Inconsistent Dimensions in Data Warehouses
A Data Warehouse (DW) is a data repository that integrates data from multiple sources and organizes the data according to a set of data structures called dimensions. Each dimension...
Loreto Bravo, Mónica Caniupán Marile...