Sciweavers

295 search results - page 27 / 59
» Dynamic Access Control for Multi-privileged Group Communicat...
Sort
View
154
Voted
ICDS
2009
IEEE
15 years 10 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton
126
Voted
VTC
2008
IEEE
270views Communications» more  VTC 2008»
15 years 9 months ago
Interference Avoidance through Dynamic Downlink OFDMA Subchannel Allocation using Intercell Coordination
Abstract- OFDMA subchannel allocation has been wellstudied. However, most of the available literature considers a single cell system without cochannel interference. We present a no...
Mahmudur Rahman, Halim Yanikomeroglu
PERCOM
2006
ACM
16 years 2 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
120
Voted
INFOCOM
2000
IEEE
15 years 7 months ago
REUNITE: A Recursive Unicast Approach to Multicast
—We propose a new multicast protocol called REUNITE. The key idea of REUNITE is to use recursive unicast trees to implement multicast service. REUNITE does not use class D IP add...
Ion Stoica, T. S. Eugene Ng, Hui Zhang
GROUP
2007
ACM
15 years 7 months ago
Searching for experts in the enterprise: combining text and social network analysis
Employees depend on other people in the enterprise for rapid access to important information. But current systems for finding experts do not adequately address the social implicat...
Kate Ehrlich, Ching-Yung Lin, Vicky Griffiths-Fish...