Sciweavers

249 search results - page 33 / 50
» P Systems with Adjoining Controlled Communication Rules
Sort
View
MOBILITY
2009
ACM
14 years 10 days ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
IWCMC
2006
ACM
14 years 1 months ago
Security aspects of inter-satellite links using neural networks
This paper presents a neural network model for routing in the space segment of a Satellite Personal Communication System. At first, a proper energy function is constructed from th...
Peter P. Stavroulakis, Ioannis Dimou, Harilaos G. ...
JMS
2007
151views more  JMS 2007»
13 years 7 months ago
Wireless Body Sensor Network Using Medical Implant Band
A wireless body sensor network hardware has been designed and implemented based on MICS (Medical Implant Communication Service) band. The MICS band offers the advantage of miniatur...
Mehmet R. Yuce, Steven W. P. Ng, Naung L. Myo, Jam...
ISORC
1999
IEEE
13 years 12 months ago
An Object-level Gateway Supporting Integrated-Property Quality of Service
As networks and the use of communication within applications continue to grow and find more uses, so too does the demand for more control and manageability of various "system...
Richard E. Schantz, John A. Zinky, David A. Karr, ...
XMLSEC
2003
ACM
14 years 28 days ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci