Sciweavers

1627 search results - page 252 / 326
» On context in authorization policy
Sort
View
CDC
2008
IEEE
141views Control Systems» more  CDC 2008»
14 years 3 months ago
Distributed welfare games with applications to sensor coverage
We consider a variation of the resource allocation problem. In the traditional problem, there is a global planner who would like to assign a set of players to a set of resources s...
Jason R. Marden, Adam Wierman
ICC
2007
IEEE
14 years 3 months ago
Enhanced Dominant Pruning-based Broadcasting in Untrusted Ad-hoc Wireless Networks
Abstract—Many protocols for ad-hoc wireless networks perform poorly in situations when node cooperation cannot be enforced. This may happen because of the lack of global authorit...
Ashikur Rahman, Pawel Gburzynski, Bozena Kaminska
ICSOC
2007
Springer
14 years 3 months ago
Contextualized B2B Registries
Service discovery is a fundamental concept underpinning the move towards dynamic service-oriented business partnerships. The business process for integrating service discovery and ...
Uwe Radetzki, Mike J. Boniface, Mike Surridge
AICT
2006
IEEE
14 years 2 months ago
Web Services Roadmap: The Semantic Web Perspective
Recently the field of Web services has gained focus both in industry and academia. While industry has been mostly interested in standardisation and promotion of the technology, a...
Peep Küngas, Mihhail Matskin
CCGRID
2006
IEEE
14 years 2 months ago
Virtual Clusters for Grid Communities
A challenging issue facing Grid communities is that while Grids can provide access to many heterogeneous resources, the resources to which access is provided often do not match th...
Ian T. Foster, Timothy Freeman, Katarzyna Keahey, ...