Sciweavers

5252 search results - page 871 / 1051
» Logic in Access Control
Sort
View
ICT
2004
Springer
127views Communications» more  ICT 2004»
15 years 9 months ago
An Interference Avoidance Technique for Ad Hoc Networks Employing Array Antennas
Array antennas have the potential to increase the capacity of wireless networks, but a distributed beamforming algorithm for maximizing the capacity in asynchronous, decentralized ...
T. Hunziker, Jacir Luiz Bordim, T. Ohira, Shinsuke...
ISI
2004
Springer
15 years 9 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
ISW
2004
Springer
15 years 9 months ago
Survey on the Technological Aspects of Digital Rights Management
Abstract. Digitalization of content is both a blessing and a curse. While it allows for efficient transmission and consumption, the ease of copying and sharing digital content has ...
William Ku, Chi-Hung Chi
MATA
2004
Springer
101views Communications» more  MATA 2004»
15 years 9 months ago
Mobile Tourist Guide Services with Software Agents
Applications for mobile devices have some restrictions because of the limited capabilities and heterogeneity of these devices. However, their communication capabilities allow the d...
Juan Pavón, Juan M. Corchado, Jorge J. G&oa...
PCM
2004
Springer
121views Multimedia» more  PCM 2004»
15 years 9 months ago
A Java-Based Collaborative Authoring System for Multimedia Presentation
Abstract. In this paper, we propose a Java-based collaborative authoring system for multimedia presentation. Our system is composed of an Editing System, a Media Object Manager and...
Mee Young Sung, Do Hyung Lee