Sciweavers

581 search results - page 55 / 117
» policy 2009
Sort
View
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
13 years 6 months ago
Optimal control in two-hop relay routing
We study the optimal control of propagation of packets in delay tolerant mobile ad-hoc networks. We consider a two-hop forwarding policy under which the expected number of nodes ca...
Eitan Altman, Tamer Basar, Francesco De Pellegrini
FAST
2009
13 years 6 months ago
Towards Semantics for Provenance Security
Provenance records the history of data. Careless use of provenance may violate the security policies of data. Moreover, the provenance itself may be sensitive information, necessi...
Stephen Chong
GI
2009
Springer
13 years 6 months ago
Putting Privacy Pictograms into Practice - a European Perspective
: Recent proposals for privacy pictograms show a growing interest of simplifying privacy-related statements. Such pictograms can be useful to enhance the users' understanding ...
Marit Hansen
ICUMT
2009
13 years 6 months ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio
CCIA
2009
Springer
13 years 9 months ago
mWater: a Sandbox for Agreement Technologies
The management of natural resources is an intricate and consequential task. In particular, water management is at the forefront of public policy priorities in many countries becaus...
Antonio Garrido, Adriana Giret, Pablo Noriega