Sciweavers

2335 search results - page 419 / 467
» Wireless network cloud: Architecture and system requirements
Sort
View
RTCSA
2009
IEEE
14 years 2 months ago
Event-Based Location Dependent Data Services in Mobile WSNs
—Mobile sensors are widely deployed in Wireless Sensor Networks (WSNs) to satisfy emerging application requirements. Specifically, processing location dependent queries in mobile...
Liang Hong, Yafeng Wu, Sang Hyuk Son, Yansheng Lu
SRDS
1999
IEEE
13 years 12 months ago
An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging
Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures....
Kuo-Feng Ssu, Bin Yao, W. Kent Fuchs
SACMAT
2003
ACM
14 years 27 days ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
ISPAN
2008
IEEE
14 years 2 months ago
M-Ring: A Distributed, Self-Organized, Load-Balanced Communication Method on Super Peer Network
- Many peer-to-peer file sharing systems have been proposed to take the locality and heterogeneity into account. The two-layered architecture is one of the most widespread systems ...
Tsung-Han Lin, Tsung-Hsuan Ho, Yu-Wei Chan, Yeh-Ch...
SACMAT
2004
ACM
14 years 1 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...