Sciweavers

282 search results - page 52 / 57
» Private Policy Negotiation
Sort
View
FGCS
2008
159views more  FGCS 2008»
13 years 7 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
CLUSTER
2006
IEEE
13 years 7 months ago
Distributed File System Virtualization Techniques Supporting On-Demand Virtual Machine Environments for Grid Computing
This paper presents a data management solution which allows fast Virtual Machine (VM) instantiation and efficient run-time execution to support VMs as execution environments in Gri...
Ming Zhao 0002, Jian Zhang 0005, Renato J. O. Figu...
ENVSOFT
2007
97views more  ENVSOFT 2007»
13 years 7 months ago
Coupled human and natural systems: A multi-agent-based approach
A major force affecting many forest ecosystems is the encroachment of residential, commercial and industrial development. Analysis of the complex interactions between development ...
Michael Monticino, Miguel F. Acevedo, Baird Callic...
COMCOM
2004
85views more  COMCOM 2004»
13 years 7 months ago
Optimal PNNI complex node representations for restrictive costs
The Private Network-to-Network Interface (PNNI) is a scalable hierarchical protocol that allows ATM switches to be aggregated into clusters called peer groups. To provide good acc...
Ilias Iliadis
CCS
2010
ACM
13 years 6 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov