Sciweavers

2099 search results - page 399 / 420
» Service Trading and Mediation in Distributed Computing Syste...
Sort
View
SWS
2004
ACM
14 years 1 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
IDMS
1999
Springer
117views Multimedia» more  IDMS 1999»
13 years 12 months ago
Tailoring Protocols for Dynamic Network Conditions and User Requirements
This paper shows the use of protocols dynamically generated for a particular network environment and an application’s requirements. We have developed a novel system called PNUT (...
R. De Silva, Aruna Seneviratne
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 9 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
RTS
2006
106views more  RTS 2006»
13 years 7 months ago
Q-SCA: Incorporating QoS support into software communications architecture for SDR waveform processing
The Software Communications Architecture (SCA) defined by Joint Tactical Radio Systems (JTRS) is the de facto standard middleware currently adopted by the Software Defined Radio (...
Jaesoo Lee, Saehwa Kim, Jiyong Park, Seongsoo Hong
KDD
2009
ACM
257views Data Mining» more  KDD 2009»
14 years 2 months ago
Argo: intelligent advertising by mining a user's interest from his photo collections
In this paper, we introduce a system named Argo which provides intelligent advertising made possible from users’ photo collections. Based on the intuition that user-generated ph...
Xin-Jing Wang, Mo Yu, Lei Zhang, Rui Cai, Wei-Ying...