Sciweavers

4118 search results - page 62 / 824
» Mechanisms for usage control
Sort
View
ICRA
2002
IEEE
78views Robotics» more  ICRA 2002»
15 years 8 months ago
Positioning Performance of L-Shaped Seal Mechanism with 3 Degrees of Freedom
––This paper deals with a small mobile device, "Seal Mechanism," with three degrees of freedom (DOFs). An L-shaped structure of Seal Mechanism is proposed. This devic...
Katsushi Furutani, Noriyuki Ohta
116
Voted
CN
2004
86views more  CN 2004»
15 years 3 months ago
Management of abusive and unfair Internet access by quota-based priority control
In a free of charge or flat-rate Internet access environment, there often exists abusive and unfair usage of network resources. In this paper, the Internet access by the dormitory...
Tsung-Ching Lin, Yeali S. Sun, Shi-Chung Chang, Sh...
130
Voted
ECOOP
2004
Springer
15 years 9 months ago
Ownership Domains: Separating Aliasing Policy from Mechanism
Ownership types promise to provide a practical mechanism for enforcing stronger encapsulation by controlling aliasing in objectoriented languages. However, previous ownership type ...
Jonathan Aldrich, Craig Chambers
137
Voted
GI
2001
Springer
15 years 8 months ago
Building ALL-IP Based Virtual Private Networks in Mobile Environment
Security mechanisms such as firewalls commonly deployed throughout the Internet present serious obstacles to basic usage of Mobile IP. In this paper we describe how IP security me...
Reinhard Ruppelt, Andrei Pelinescu, Cristian Const...
116
Voted
LCN
2000
IEEE
15 years 7 months ago
Efficient Congestion Avoidance Mechanism
The nowadays Internet architecture is mainly based on unicast communications and best-effort service. However, the development of the Internet encouraged emerging services that ar...
Anca Dracinschi Sailer, Serge Fdida