Sciweavers

25 search results - page 1 / 5
» Security Management Through Overloading Views
Sort
View
COOPIS
2004
IEEE
13 years 8 months ago
Security Management Through Overloading Views
The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of dat...
Radoslaw Adamus, Kazimierz Subieta
JCM
2006
73views more  JCM 2006»
13 years 4 months ago
Wireless Networks Revenue Optimization through Overload Control with Priority Services
Wireless networks are currently experiencing more overload situations than their wireline counterparts because of explosive mobile traffic growth, unpredictable traffic behavior, s...
Haitao Lin, Preetam Ghosh, Prabir Das
HICSS
2000
IEEE
147views Biometrics» more  HICSS 2000»
13 years 9 months ago
Persistence and Lurkers in Discussion Lists: A Pilot Study
In email-based discussion lists (DLs), messages resident in archives, email clients and elsewhere are persistent. One way of examining persistent messages is through the eyes of l...
Blair Nonnecke, Jennifer Preece
CCS
2010
ACM
13 years 11 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
CDC
2010
IEEE
161views Control Systems» more  CDC 2010»
12 years 11 months ago
A geometric approach to air traffic complexity evaluation for strategic trajectory management
In the perspective next generation Air Traffic Management (ATM) systems, aircraft will be endowed with part of the responsibility for separation maintenance, and traffic complexity...
Luigi Piroddi, Maria Prandini