Sciweavers

852 search results - page 113 / 171
» Model-Checking Access Control Policies
Sort
View
ACJ
2006
85views more  ACJ 2006»
13 years 9 months ago
Tree Automata for Schema-Level Filtering of XML Associations
In this paper we present query filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represen...
Vaibhav Gowadia, Csilla Farkas
ICC
2008
IEEE
133views Communications» more  ICC 2008»
14 years 3 months ago
Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks
Abstract—Wireless mesh network (WMN) has emerged recently as a promising technology for next-generation wireless networking. In WMN, it is important to provide an efficient hand...
Bo Rong, Yi Qian, Kejie Lu, Michel Kadoch
VTC
2008
IEEE
152views Communications» more  VTC 2008»
14 years 3 months ago
Network Controlled Joint Radio Resource Management for Heterogeneous Networks
Abstract— In this paper, we propose a way of achieving optimality in radio resource management (RRM) for heterogeneous networks. We consider a micro or femto cell with two co-loc...
Marceau Coupechoux, Jean Marc Kelif, Philippe Godl...
SASO
2007
IEEE
14 years 3 months ago
Shruti: A Self-Tuning Hierarchical Aggregation System
Current aggregation systems either have a single inbuilt aggregation mechanism or require applications to specify an aggregation policy a priori. It is hard to predict the read an...
Praveen Yalagandula, Michael Dahlin
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
14 years 2 months ago
Virtual Organizations as Normative Multiagent Systems
In this paper we propose a conceptual model of virtual organizations as normative multiagent systems. The dynamic aspects of virtual organizations are modeled using aspects of spe...
Guido Boella, Joris Hulstijn, Leendert W. N. van d...