Sciweavers

9182 search results - page 1761 / 1837
» Requirements for Requirements Management Tools
Sort
View
SASN
2005
ACM
14 years 3 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
SIGIR
2005
ACM
14 years 3 months ago
A probabilistic model for retrospective news event detection
Retrospective news event detection (RED) is defined as the discovery of previously unidentified events in historical news corpus. Although both the contents and time information...
Zhiwei Li, Bin Wang, Mingjing Li, Wei-Ying Ma
WOWMOM
2005
ACM
129views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
The Wireless Hierarchical Token Bucket: A Channel Aware Scheduler for 802.11 Networks
The paper proposes an architecture for a scheduling algorithm, to be integrated in IEEE 802.11 Access Points (AP), able to take into account, besides the transport service class r...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...
CCS
2005
ACM
14 years 3 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
CCS
2005
ACM
14 years 3 months ago
PeerAccess: a logic for distributed authorization
This paper introduces the PeerAccess framework for reasoning about authorization in open distributed systems, and shows how a parameterization of the framework can be used to reas...
Marianne Winslett, Charles C. Zhang, Piero A. Bona...
« Prev « First page 1761 / 1837 Last » Next »