Sciweavers

1818 search results - page 172 / 364
» How users use access control
Sort
View
TPDS
2002
127views more  TPDS 2002»
13 years 9 months ago
Adaptive Bandwidth Reservation and Admission Control in QoS-Sensitive Cellular Networks
How to keep the probability of hand-off drops within a prespecified limit is a very important Quality-of-Service (QoS) issue in cellular networks because mobile users should be abl...
Sunghyun Choi, Kang G. Shin
HUC
2003
Springer
14 years 2 months ago
Activity Zones for Context-Aware Computing
Location is a primary cue in many context-aware computing systems, and is often represented as a global coordinate, room number, or a set of Euclidean distances to various landmark...
Kimberle Koile, Konrad Tollmar, David Demirdjian, ...
ICC
2007
IEEE
214views Communications» more  ICC 2007»
14 years 4 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
CSE
2009
IEEE
14 years 4 months ago
A Framework to Balance Privacy and Data Usability Using Data Degradation
—Personal data is a valuable asset for service providers. To collect such data, free services are offered to users, for whom the risk of loosing privacy by subscribing to a servi...
Harold van Heerde, Maarten M. Fokkinga, Nicolas An...
NDSS
2006
IEEE
14 years 3 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...