Sciweavers

2172 search results - page 96 / 435
» Distributed User Access Control in Sensor Networks
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
MOBICOM
2009
ACM
14 years 2 months ago
Achievable throughput of multiple access spectrum systems based on cognitive relay
Cognitive relays form a special cooperation relationship among users in cognitive radio networks, and help increase the transmission rates of both primary users and secondary user...
Wei Wang, Baochun Li, Li Yu
ICDCS
2008
IEEE
14 years 2 months ago
Hotness-Aware Sensor Networks
In a realistic sensor network, in particular with a nonuniform deployment, sensor nodes inevitably have varying workloads. This causes a natural problem that some sensor nodes are...
Dong Li, Yanmin Zhu, Li Cui, Lionel M. Ni
SSS
2009
Springer
209views Control Systems» more  SSS 2009»
14 years 2 months ago
CFlood: A Constrained Flooding Protocol for Real-time Data Delivery in Wireless Sensor Networks
Real-time performance is critical for many time-sensitive applications of wireless sensor networks. We present a constrained flooding protocol, called CFlood that enhances the dea...
Bo Jiang, Binoy Ravindran, Hyeonjoong Cho
SACMAT
2004
ACM
14 years 1 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...