Sciweavers

1818 search results - page 166 / 364
» How users use access control
Sort
View
IJET
2006
112views more  IJET 2006»
13 years 9 months ago
Personalized E-Learning in the Semantic Web
: The challenge of the semantic web is the provision of distributed information with well defined meaning, understandable for different parties. Particularly, applications should b...
Nicola Henze
TARK
2009
Springer
14 years 4 months ago
A computational theory of awareness and decision making
We exhibit a new computational-based definition of awareness, informally that our level of unawareness of an object is the amount of time needed to generate that object within a ...
Nikhil R. Devanur, Lance Fortnow
PERCOM
2005
ACM
14 years 9 months ago
Unleashing the Power of Wearable Devices in a SIP Infrastructure
The Session Initiation Protocol (SIP) has been widely adopted for Instant Messaging (IM) and VoIP telephony both by the enterprise and in service provider systems. Till now, SIP f...
Arup Acharya, Stefan Berger, Chandrasekhar Narayan...
INFOCOM
2010
IEEE
13 years 8 months ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
DIMVA
2006
13 years 11 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...