Sciweavers

3121 search results - page 552 / 625
» Information Survivability Control Systems
Sort
View
149
Voted
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
134
Voted
COLCOM
2005
IEEE
15 years 9 months ago
Location assisted routing for near-far effect mitigation in wireless networks
CDMA technology represents an attractive choice for various wireless ad hoc networks applications, due to its appealing properties, such as resistance to jamming and interference,...
Hassan Mahmood, Cristina Comaniciu
157
Voted
COMPSAC
2005
IEEE
15 years 9 months ago
Considerations on a New Software Architecture for Distributed Environments Using Autonomous Semantic Agents
Distributed processing environments such as that of a traffic management network system (TMS) can be implemented easier, faster, and secure and perform better through use of auton...
Atilla Elçi, Behnam Rahnama
120
Voted
ICALT
2005
IEEE
15 years 9 months ago
Integrating Wireless Technology in Pocket Electronic Dictionary to Enhance Language Learning
We believe that with regard to the information technology applications in education, one student one computing device will be the future and long-term trend. Many related studies ...
Jen-Kai Liang, Tzu-Chien Liu, Hsue-Yie Wang, Tak-W...
121
Voted
KCAP
2005
ACM
15 years 9 months ago
Knowledge base reuse through constraint relaxation
Effective reuse of Knowledge Bases (KBs) often entails the expensive task of identifying plausible KB-PS (Problem Solver) combinations. We propose a novel technique based on Const...
Tomas Eric Nordlander, Derek H. Sleeman, Ken N. Br...