Sciweavers

1818 search results - page 287 / 364
» How users use access control
Sort
View
DCOSS
2005
Springer
14 years 3 months ago
jWebDust : A Java-Based Generic Application Environment for Wireless Sensor Networks
Abstract. Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and t...
Ioannis Chatzigiannakis, Georgios Mylonas, Sotiris...
RAID
2004
Springer
14 years 3 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
TRUST
2009
Springer
14 years 4 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
JSAC
2008
157views more  JSAC 2008»
13 years 10 months ago
Spectrum Leasing to Cooperating Secondary Ad Hoc Networks
Abstract--The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resource ...
Osvaldo Simeone, Igor Stanojev, Stefano Savazzi, Y...
ANLP
1994
155views more  ANLP 1994»
13 years 11 months ago
Guided Sentences Composition for Disabled People
We present the advantages of guided sentences composition for communicating in natural language with computers. We show how guidance can be achieved by means of the partial synthe...
Robert Pasero, Nathalie Richardet, Paul Sabatier