Sciweavers

828 search results - page 123 / 166
» Access Control in Location-Based Services
Sort
View
VTC
2006
IEEE
109views Communications» more  VTC 2006»
15 years 3 months ago
Scheduling-Based Coordination Function (SCF) in WLANs for High Throughput
— IEEE 802.11 WLAN has been widely accepted throughout the world. However, it has large overhead due to idle backoff slots and frequent collisions depending on the number of node...
Hojin Lee, Jaeyoung Choi, Taekyoung Kwon, Yanghee ...
CRYPTO
2005
Springer
103views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Pebbling and Proofs of Work
We investigate methods for providing easy-to-check proofs of computational effort. Originally intended for discouraging spam, the concept has wide applicability as a method for co...
Cynthia Dwork, Moni Naor, Hoeteck Wee
MADNES
2005
Springer
15 years 3 months ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell
PDP
2003
IEEE
15 years 3 months ago
A multi-tiered agent-based architecture for a cooperative learning environment
: In this paper the problem of educational resource management in a cooperative learning environment is discussed. A task model was elaborated to determine both functional and leve...
Eduardo Sánchez Vila, Manuel Lama, Ricardo ...
RIDE
2002
IEEE
15 years 2 months ago
Extensible Data Management in the Middle-Tier
Current data management solutions are largely optimized for intra-enterprise, client-server applications. They depend on predictability, predefined structure, and universal admini...
Brian F. Cooper, Neal Sample, Michael J. Franklin,...