Sciweavers

807 search results - page 99 / 162
» Term Rewriting for Access Control
Sort
View
DSONLINE
2006
79views more  DSONLINE 2006»
15 years 3 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
138
Voted
IJAHUC
2007
135views more  IJAHUC 2007»
15 years 3 months ago
Service Location Protocols for mobile wireless ad hoc networks
: As service-oriented networks are essential in our lives, service location, access and provisioning over wired or wireless networks govern users’ satisfaction. While they are we...
Chai-Keong Toh, Guillermo Guichal, Dongkyun Kim, V...
170
Voted
WISE
2010
Springer
15 years 1 months ago
The Ubiquitous DBMS
Advancement in mobile computing technologies has prompted strong needs for database systems that can be used in small devices such as sensors, cellular phones, PDAs, car navigator...
Kyu-Young Whang
141
Voted
CDC
2010
IEEE
148views Control Systems» more  CDC 2010»
14 years 10 months ago
Distributed parameter estimation in networks
In this paper, we present a model of distributed parameter estimation in networks, where agents have access to partially informative measurements over time. Each agent faces a loca...
Kamiar Rahnama Rad, Alireza Tahbaz-Salehi
162
Voted
JSAC
2011
171views more  JSAC 2011»
14 years 6 months ago
QoS Provisioning for Heterogeneous Services in Cooperative Cognitive Radio Networks
—In this paper, we propose a spectrum allocation framework that jointly considers the Quality-of-Service (QoS) provisioning for heterogeneous secondary Real-Time (RT) and Non-Rea...
Ammar Alshamrani, Xuemin (Sherman) Shen, Liang-Lia...