Sciweavers

2684 search results - page 510 / 537
» On the Connectivity of Ad Hoc Networks
Sort
View
POLICY
2004
Springer
14 years 1 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the specification of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
FTDCS
2003
IEEE
14 years 1 months ago
Looking for a Common View for Mobile Worlds
This paper considers central issues of distributed computing in a mobile environment. Its aim is to light on the first brick of a common view for mobile systems. We pool together...
Maria Gradinariu, Michel Raynal, Gwendal Simon
CAISE
2003
Springer
14 years 1 months ago
Sharing Mobile Databases in Dynamically Configurable Environments
We define a Mobile Database Community (MDBC) as a dynamic collection of autonomous mobile databases in which each database user can access databases in the community through a wir...
Angelo Brayner, José de Aguiar Moraes Filho
CCS
2003
ACM
14 years 1 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
INFOCOM
2002
IEEE
14 years 25 days ago
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement
IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the I...
Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, ...