Sciweavers

871 search results - page 126 / 175
» A Decentralized Authorization Architecture
Sort
View
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
15 years 3 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
SISW
2003
IEEE
15 years 3 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
HUC
2009
Springer
15 years 2 months ago
Wearable therapist: sensing garments for supporting children improve posture
This paper introduces a sensing garment to support posture coaching in children. The system measures back bending postures using acceleration sensors embedded in the garment. We p...
Holger Harms, Oliver Amft, Gerhard Tröster, M...
SP
2000
IEEE
15 years 2 months ago
A Practically Implementable and Tractable Delegation Logic
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
ERLANG
2007
ACM
15 years 1 months ago
An Erlang framework for autonomous mobile robots
This paper presents an Erlang-based framework, developed by the authors, for the realisation of software systems for autonomous mobile robots. On the basis of the analysis of the ...
Corrado Santoro