Sciweavers

629 search results - page 79 / 126
» Reasoning About Knowledge of Unawareness
Sort
View
CCS
2005
ACM
14 years 1 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
ESORICS
2002
Springer
14 years 7 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
IAT
2008
IEEE
14 years 2 months ago
Acquiring Vague Temporal Information from the Web
Many real–world information needs are naturally formulated as queries with temporal constraints. However, the structured temporal background information needed to support such c...
Steven Schockaert, Martine De Cock, Etienne E. Ker...
ISCAS
2007
IEEE
117views Hardware» more  ISCAS 2007»
14 years 2 months ago
On the Impact of I/Q Imbalance in Multi-Carrier Systems for Different Channel Scenarios
— I/Q imbalance has been identified as one of the most serious concerns in the practical implementation of the direct conversion receiver architecture. Facing the performance-de...
Marcus Windisch, Gerhard Fettweis
VTC
2007
IEEE
14 years 2 months ago
Mobility-Aware Data Management on Mobile Wireless Networks
— We design a Mobility-aware DAta management (MoDA) scheme for mobile ad hoc networks (MANETs) composed by mobile nodes such as urban pedestrians and vehicles. By fully utilizing...
Akiko Yamasaki, Hirozumi Yamaguchi, Shinji Kusumot...