Sciweavers

359 search results - page 33 / 72
» Foundation for a Time Interval Access Control Model
Sort
View
ESORICS
2004
Springer
14 years 1 months ago
Parameterized Authentication
We describe an approach to sensor-based authentication that can adapt to accommodate incomplete, unreliable, or inaccurate input provided to the system. Parameterized Authenticatio...
Michael J. Covington, Mustaque Ahamad, Irfan A. Es...
INFOCOM
2000
IEEE
13 years 11 months ago
A Predictability Analysis of Network Traffic
This paper assesses the predictability of network traffic by considering two metrics: (1) how far into the future a traffic rate process can be predicted with bounded error; (2) w...
Aimin Sang, San-qi Li
INFOCOM
2006
IEEE
14 years 1 months ago
Extracting a Mobility Model from Real User Traces
Abstract— Understanding user mobility is critical for simulations of mobile devices in a wireless network, but current mobility models often do not reflect real user movements. ...
Minkyong Kim, David Kotz, Songkuk Kim
ICEBE
2007
IEEE
91views Business» more  ICEBE 2007»
14 years 2 months ago
Strategy, Model, and Platform for Collaborative Commerce
Globalization and rapid development of Information Technologies have set a new stage for business. Collaborative Commerce has become a strategic necessity to develop high quality ...
Shuangxi Huang, Yushun Fan
HYBRID
2007
Springer
14 years 1 months ago
Optimal Switches in Multi-inventory Systems
Given a switched multi–inventory system we wish to find the optimal schedule of the resets to maintain the system in a safe operating interval, while minimizing a function relat...
Dario Bauso