Sciweavers

232 search results - page 14 / 47
» Credentials-Based Authorization: Evaluation and Implementati...
Sort
View
HUC
2010
Springer
13 years 8 months ago
Vehicular speed estimation using received signal strength from mobile phones
This paper introduces an algorithm that estimates the speed of a mobile phone by matching time-series signal strength data to a known signal strength trace from the same road. Kno...
Gayathri Chandrasekaran, Tam Vu, Alexander Varshav...
IFIPTM
2009
163views Management» more  IFIPTM 2009»
13 years 7 months ago
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation
To date, research in trust negotiation has focused mainly on the theoretical aspects of the trust negotiation process, and the development of proof of concept implementations. Thes...
Adam J. Lee, Marianne Winslett, Kenneth J. Perano
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 4 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
POLICY
2005
Springer
14 years 3 months ago
Obligation Policies: An Enforcement Platform
The use of policy-based mechanisms significantly reduces the complexity associated with applicational development and operation. In particular, history-based policies allow the s...
Pedro Gama, Paulo Ferreira
IJCAI
2003
13 years 11 months ago
Writer's Aid: Using a Planner in a Collaborative Interface
Writer’s Aid is a collaborative system that works simultaneously with an author editing a document providing assistance in identifying and inserting citation keys and autonomous...
Tamara Babaian, Barbara J. Grosz, Stuart M. Shiebe...