— This work provides the specification of a MAC layer simulator that evaluates the service quality in WiFi, and presents initial results as a stand-alone simulator. The simulator...
Orlando Cabral, Alberto Segarra, Fernando J. Velez
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Component-based operating systems enable embedded systems to adapt system policies, mechanisms, and abstractions to the specific workloads and contexts of each system. The scope o...
Semantic Web databases allow efficient storage and access to RDF statements. Applications are able to use expressive query languages in order to retrieve relevant metadata to perfo...
Fabian Abel, Juri Luca De Coi, Nicola Henze, Arne ...
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...