Sciweavers

871 search results - page 141 / 175
» A Decentralized Authorization Architecture
Sort
View
RAM
2008
IEEE
163views Robotics» more  RAM 2008»
15 years 4 months ago
Reactive Gaze Control for Natural Human-Robot Interactions
Abstract—Nonverbal behavior during human-human close encounters is critical to the accomplishment of natural interaction. For this reason, humanoid robots trying to achieve natur...
Yasser F. O. Mohammad, Toyoaki Nishida
GLOBECOM
2007
IEEE
15 years 4 months ago
A Congestion-Only Charging Mechanism for Multiplayer Gaming in Differentiated Services Networks
— In future networks based on the Differentiated Services (DiffServ) architecture, users may be provided with the opportunity to choose their Assured Forwarding (AF) class. Users...
Brian Carrig, David Denieffe, John Murphy
ICC
2007
IEEE
169views Communications» more  ICC 2007»
15 years 4 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
—Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho
ICIW
2007
IEEE
15 years 4 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
KBSE
2007
IEEE
15 years 4 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr