Sciweavers

1627 search results - page 112 / 326
» On context in authorization policy
Sort
View
CSCW
1994
ACM
14 years 2 months ago
A Flexible Object Merging Framework
The need to merge different versions of an object toa common state arises in collaborative computing due to several reasons including optimistic concurrency control, asynchronous ...
Jonathan P. Munson, Prasun Dewan
CRISIS
2008
14 years 9 days ago
An ontology-based approach to react to network attacks
To address the evolution of security incidents in current communication networks it is important to react quickly and efficiently to an attack. The RED (Reaction after Detection) ...
Nora Cuppens-Boulahia, Frédéric Cupp...
MODELLIERUNG
2008
14 years 5 days ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
TON
2010
151views more  TON 2010»
13 years 5 months ago
Throughput Optimal Distributed Power Control of Stochastic Wireless Networks
The Maximum Differential Backlog (MDB) control policy of Tassiulas and Ephremides has been shown to adaptively maximize the stable throughput of multihop wireless networks with ran...
Yufang Xi, Edmund M. Yeh
CHI
2005
ACM
14 years 11 months ago
Context-aware collaborative filtering system: predicting the user's preferences in ubiquitous computing
In this paper I propose a context-aware collaborative filtering system that can predict a user's preference in different context situations based on past user-experiences. Th...
Annie Chen