Sciweavers

708 search results - page 138 / 142
» Implementing access control to people location information
Sort
View
SECON
2010
IEEE
13 years 5 months ago
SAND: Sectored-Antenna Neighbor Discovery Protocol for Wireless Networks
Abstract--Directional antennas offer many potential advantages for wireless networks such as increased network capacity, extended transmission range and reduced energy consumption....
Emad Felemban, Robert Murawski, Eylem Ekici, Sangj...
NTMS
2009
IEEE
14 years 2 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...
DL
1998
Springer
180views Digital Library» more  DL 1998»
13 years 12 months ago
Automatic Subject Indexing Using an Associative Neural Network
The global growth in popularity of the World Wide Web has been enabled in part by the availability of browser based search tools which in turn have led to an increased demand for ...
Yi-Ming Chung, William M. Pottenger, Bruce R. Scha...
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
ISM
2008
IEEE
273views Multimedia» more  ISM 2008»
13 years 7 months ago
Understanding Data-Driven Decision Support Systems
It is important for managers and Information Technology professionals to understand data-driven decision support systems and how such systems can provide business intelligence and ...
Daniel J. Power