Sciweavers

5252 search results - page 878 / 1051
» Logic in Access Control
Sort
View
HICSS
2002
IEEE
150views Biometrics» more  HICSS 2002»
15 years 9 months ago
An Architecture for Location Aware Applications
This paper presents an architecture for location aware applications, where positioning sources such as GPS, WaveLAN and Bluetooth devices can be seamlessly interchanged or even co...
James Nord, Kåre Synnes, Peter Parnes
ICDCSW
2002
IEEE
15 years 9 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
ICPADS
2002
IEEE
15 years 9 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
ICRA
2002
IEEE
105views Robotics» more  ICRA 2002»
15 years 9 months ago
A Robotic Library System for an Off-Site Shelving Facility
This paper describes a unique robotics project, Comprehensive Access to Printed Materials (CAPM), within the context of libraries. As libraries provide a growing array of digital ...
Jackrit Suthakorn, Sangyoon Lee, Yu Zhou, Rory Tho...
ITCC
2002
IEEE
15 years 9 months ago
Performance of KDB-Trees with Query-Based Splitting
While the persistent data of many advanced database applications, such as OLAP and scientific studies, are characterized by very high dimensionality, typical queries posed on thes...
Yves Lépouchard, John L. Pfaltz, Ratko Orla...