Sciweavers

804 search results - page 89 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
ICDCS
2010
IEEE
15 years 8 months ago
ESCUDO: A Fine-Grained Protection Model for Web Browsers
Web applications are no longer simple hyperlinked documents. They have progressively evolved to become highly complex—web pages combine content from several sources (with varyin...
Karthick Jayaraman, Wenliang Du, Balamurugan Rajag...
SIMUTOOLS
2008
15 years 6 months ago
Implementing MAC protocols for cooperative relaying: a compiler-assisted approach
Evaluating the performance of a cooperative relaying protocol requires an implementation for simulators and/or software-defined radios (SDRs) with an appropriate model for error d...
Hermann S. Lichte, Stefan Valentin
CE
2007
100views more  CE 2007»
15 years 4 months ago
Visualization of participation: Does it contribute to successful computer-supported collaborative learning?
This study investigated the effects of visualization of participation during computer-supported collaborative learning (CSCL). It is hypothesized that visualization of participat...
Jeroen Janssen, Gijsbert Erkens, Gellof Kanselaar,...
EMSOFT
2004
Springer
15 years 10 months ago
Making mechatronic agents resource-aware in order to enable safe dynamic resource allocation
Mechatronic systems are embedded software systems with hard real-time requirements. Predictability is of paramount importance for these systems. Thus, their design has to take the...
Sven Burmester, Matthias Gehrke, Holger Giese, Sim...
IEEEARES
2007
IEEE
15 years 11 months ago
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems
Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organisations, humans, software agents from diff...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell