Sciweavers

8322 search results - page 1579 / 1665
» What Are We Looking for
Sort
View
CODASPY
2011
12 years 11 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
FLAIRS
2011
12 years 11 months ago
Affective Text: Generation Strategies and Emotion Measurement Issues
In affective natural language generation (NLG) a major aim is to be able to influence the emotional effects evoked in the addressee through the intelligent use of language. While...
Ielka van der Sluis, Chris Mellish, Gavin Doherty
IPSN
2011
Springer
12 years 11 months ago
Is there light at the ends of the tunnel? Wireless sensor networks for adaptive lighting in road tunnels
Existing deployments of wireless sensor networks (WSNs) are often conceived as stand-alone monitoring tools. In this paper, we report instead on a deployment where the WSN is a ke...
Matteo Ceriotti, Michele Corrà, Leandro D'O...
MOBISYS
2011
ACM
12 years 10 months ago
Odessa: enabling interactive perception applications on mobile devices
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video....
Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padman...
MONET
2011
12 years 10 months ago
Distributed Coalition Formation Games for Secure Wireless Transmission
Cooperation among wireless nodes has been recently proposed for improving the physical layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers. Whil...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...
« Prev « First page 1579 / 1665 Last » Next »