Sciweavers

351 search results - page 28 / 71
» Formalisation and implementation of Access control models
Sort
View
111
Voted
COLCOM
2005
IEEE
15 years 9 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...
136
Voted
EOR
2006
82views more  EOR 2006»
15 years 3 months ago
Flowshop scheduling research after five decades
: All information systems have to be protected. As the number of information objects and the number of users increase the task of information system's protection becomes more ...
Jatinder N. D. Gupta, Edward F. Stafford
143
Voted
EUSAI
2004
Springer
15 years 7 months ago
Distance-Based Access Modifiers Applied to Safety in Home Networks
Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of...
Kjeld Høyer Mortensen, Kari R. Schougaard, ...
149
Voted
JSW
2008
106views more  JSW 2008»
15 years 3 months ago
Factors that Significantly Impact the Implementation of an Agile Software Development Methodology
The Internet economy has altered the current rules of software engineering. Traditional development methodologies have proven too cumbersome to meet the rapidly changing requiremen...
Jeffrey A. Livermore
131
Voted
TCOM
2010
133views more  TCOM 2010»
15 years 1 months ago
Transmission control in cognitive radio as a Markovian dynamic game: Structural result on randomized threshold policies
Abstract——This paper considers an uplink time division multiple access (TDMA) cognitive radio network where multiple cognitive radios (secondary users) attempt to access a spect...
J. Huang, V. Krishnamurthy