Sciweavers

1082 search results - page 140 / 217
» Policy support for call control
Sort
View
CCS
2010
ACM
14 years 3 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
EUSAI
2003
Springer
14 years 2 months ago
Ubiquitous Attentiveness - Enabling Context-Aware Mobile Applications and Services
Abstract. We present a concept called ‘ubiquitous attentiveness’: Context information concerning the user and his environment is aggregated, exchanged and constitutes triggers ...
Herma Van Kranenburg, Alfons H. Salden, Henk Eerti...
CDC
2009
IEEE
14 years 24 days ago
On the queue-overflow probabilities of distributed scheduling algorithms
Abstract-- In this paper, we are interested in using largedeviations theory to characterize the asymptotic decay-rate of the queue-overflow probability for distributed wireless sch...
Can Zhao, Xiaojun Lin
IADIS
2004
13 years 10 months ago
Remote Laboratories for Technological and Scientific Education
In this work, a laboratory of remote access is proposed to perform experiments using the Internet in order to facilitate the propagation of technical and scientific information an...
Cleonilson Souza, Lindbergue Conde, José Fi...
IEE
2008
108views more  IEE 2008»
13 years 8 months ago
Mining execution relations for crosscutting concerns
Aspect mining tries to identify crosscutting concerns in the code of existing systems and thus supports their adaption to an aspect-oriented design. A semi-automatic static aspect...
Jens Krinke