Sciweavers

401 search results - page 27 / 81
» Dynamic security context management in Grid-based applicatio...
Sort
View
ISORC
2000
IEEE
14 years 6 hour ago
Hierarchical Feedback Adaptation for Real Time Sensor-Based Distributed Applications
This paper presents an innovative hierarchical feedback adaptation method that efficiently controls the dynamic QoS behavior of real-time distributed data-flow applications, such ...
Mihaela Cardei, Ionut Cardei, Rakesh Jha, Allalagh...
ISWC
2003
IEEE
14 years 27 days ago
SenSay: A Context-Aware Mobile Phone
SenSay is a context-aware mobile phone that adapts to dynamically changing environmental and physiological states. In addition to manipulating ringer volume, vibration, and phone ...
Daniel P. Siewiorek, Asim Smailagic, Junichi Furuk...
TON
2008
102views more  TON 2008»
13 years 7 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
USS
2008
13 years 10 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
GIS
2008
ACM
13 years 8 months ago
DRM policies for web map service
Open Digital Rights Language (ODRL) is an extensible language for specifying Rights Policy in the context of Digital Rights Management (DRM) applications. The OpenGIS® Web Map Se...
Alban Gabillon, Patrick Capolsini