Sciweavers

298 search results - page 49 / 60
» Reconciling role based management and role based access cont...
Sort
View
ADT
2008
13 years 7 months ago
A service-oriented admission control strategy for class-based IP networks
The clear trend toward the integration of current and emerging applications and services in the Internet launches new demands on service deployment and management. Distributed serv...
Solange Rito Lima, Paulo Carvalho, Vasco Freitas
WINET
2010
176views more  WINET 2010»
13 years 6 months ago
An improved mechanism for multiple MBMS sessions assignment in B3G cellular networks
In Universal Mobile Telecommunication System (UMTS), the downlink capacity is limited by the base station transmission power. Therefore, power control plays an important role to mi...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
CCS
2008
ACM
13 years 9 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
ICCS
2004
Springer
14 years 29 days ago
A Framework for Online Inversion-Based 3D Site Characterization
Our goal is to develop the capability for characterizing the three-dimensional geological structure and mechanical properties of individual sites and complete basins in earthquake-...
Volkan Akcelik, Jacobo Bielak, George Biros, Ioann...
AO
2006
97views more  AO 2006»
13 years 7 months ago
An ontological model of device function: industrial deployment and lessons learned
Functionality is one of the key concepts of knowledge about artifacts. Functional knowledge shows a part of designer's intention (so-called design rationale), and thus its sha...
Yoshinobu Kitamura, Yusuke Koji, Riichiro Mizoguch...