Sciweavers

1082 search results - page 93 / 217
» Policy support for call control
Sort
View
ATAL
2004
Springer
14 years 2 months ago
Intelligent Agents Meet Semantic Web in a Smart Meeting Room
We describe a new smart meeting room system called EasyMeeting that explores the use of FIPA agent technologies, Semantic Web ontologies, logic reasoning, and security and privacy...
Harry Chen, Filip Perich, Dipanjan Chakraborty, Ti...
CSFW
2007
IEEE
14 years 3 months ago
Dynamic Dependency Monitoring to Secure Information Flow
Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinc...
Paritosh Shroff, Scott F. Smith, Mark Thober
EUROPAR
2001
Springer
14 years 1 months ago
Building Computational Communities from Federated Resources
We describe the design and the implementation in Java and Jini of a Computational Community, which supports the federation of resources from different organisations. Resources fro...
Nathalie Furmento, Steven Newhouse, John Darlingto...
ISW
1997
Springer
14 years 1 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
IJCNN
2007
IEEE
14 years 3 months ago
Optimal Control of a Photovoltaic Solar Energy System with Adaptive Critics
- This paper presents an optimal energy control scheme for a grid independent photovoltaic (PV) solar system consisting of a PV array, battery energy storage, and time varying load...
Richard L. Welch, Ganesh K. Venayagamoorthy