Sciweavers

759 search results - page 106 / 152
» What Can Be Implemented Anonymously
Sort
View
IDMS
2001
Springer
133views Multimedia» more  IDMS 2001»
14 years 2 months ago
An Access Control Architecture for Metropolitan Area Wireless Networks
This paper introduces a novel access control architecture for publicly accessible, wireless networks. The architecture was designed to address the requirements obtained from a case...
Stefan Schmid, Joe Finney, Maomao Wu, Adrian Frida...
SIGCOMM
2000
ACM
14 years 2 months ago
SmartBridge: A scalable bridge architecture
As the number of hosts attached to a network increases beyond what can be connected by a single local area network (LAN), forwarding packets between hosts on different LANs become...
Thomas L. Rodeheffer, Chandramohan A. Thekkath, Da...
SIGSOFT
2000
ACM
14 years 2 months ago
Extracting library-based object-oriented applications
In an increasingly popular model of software distribution, software is developed in one computing environment and deployed in other environments by transfer over the internet. Ext...
Peter F. Sweeney, Frank Tip
DL
2000
Springer
169views Digital Library» more  DL 2000»
14 years 2 months ago
Asynchronous information space analysis architecture using content and structure-based service brokering
Our project focuses on rapid formation and utilization of custom collections of information for groups focused on high-paced tasks. Assembling such collections, as well as organiz...
Ke-Thia Yao, In-Young Ko, Ragy Eleish, Robert Nech...
ECAI
2000
Springer
14 years 2 months ago
Incorporation of Temporal Logic Control into Plan Operators
Domain-specific control information is often essential in solving difficult planning problems efficiently. Temporal logics are a declarative and expressive representation for su...
Jussi Rintanen