Sciweavers

1203 search results - page 161 / 241
» A Reference Model for a Networked Organization
Sort
View
100
Voted
MOBISYS
2009
ACM
16 years 1 months ago
Leveraging smart phones to reduce mobility footprints
Mobility footprint refers to the size, weight, and energy demand of the hardware that must be carried by a mobile user to be effective at any time and place. The ideal of a zero m...
Stephen Smaldone, Benjamin Gilbert, Nilton Bila, L...
PERCOM
2006
ACM
16 years 7 days ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste
ICDCS
2007
IEEE
15 years 7 months ago
mTreebone: A Hybrid Tree/Mesh Overlay for Application-Layer Live Video Multicast
Application-layer overlay networks have recently emerged as a promising solution for live media multicast on the Internet. A tree is probably the most natural structure for a mult...
Feng Wang, Yongqiang Xiong, Jiangchuan Liu
109
Voted
ICNSC
2007
IEEE
15 years 7 months ago
A Smart Vision Sensor for Detecting Risk Factors of a Toddler's Fall in a Home Environment
This paper presents a smart vision sensor for environmental hazards (such as slippery surfaces) and detecting risk factors of a toddler's fall in an indoor home perilous activ...
Hana Na, Sheng Feng Qin, David Wright
SACMAT
2005
ACM
15 years 6 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...