Sciweavers

2024 search results - page 314 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
OOPSLA
2004
Springer
15 years 8 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
CF
2004
ACM
15 years 7 months ago
An architecture to support cooperating mobile embedded systems
There is a sustained trend to embed computer systems in all kinds of intelligent products. Increasing emphasis is given to enhance the functionality of such systems beyond the pro...
Edgar Nett, Stefan Schemmer
ISORC
2002
IEEE
15 years 8 months ago
Service Differentiation in Real-Time Main Memory Databases
The demand for real-time database services has been increasing recently. Examples include sensor data fusion, stock trading, decision support, web information services, and data-i...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic
AINA
2007
IEEE
15 years 7 months ago
Conflict Detection and Resolution in Context-Aware Authorization
Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual informa...
Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalil...
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 9 months ago
An End-to-End Technique to Estimate the Transmission Rate of an IEEE 802.11 WLAN
— The deployment of wireless LANs (WLANs) has been steadily increasing over the years and estimating the actual bit rate of a WLAN device is important for management and applicat...
Antonio Augusto de Aragão Rocha, Rosa Maria...