The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
This paper describes a security architecture designed to support role-based access control for distributed object systems in a large-scale, multi-organisational enterprise in whic...
Abstract— The IEEE 802.11e standard has recently been ratified. This standard provides Quality-of-Service (QoS) guarantees in the Medium Access Control (MAC) layer of 802.11 Wir...
Abstract. The widespread deployment of inexpensive communications technology, computational resources in the networking infrastructure, and network-enabled end devices poses an int...
Todd D. Hodes, Steven E. Czerwinski, Ben Y. Zhao, ...
With the growth in digital libraries and standardization of protocols for metadata sharing, it is becoming feasible to build federated discovery services which aggregate metadata ...
Kailash Bhoopalam, Kurt Maly, Mohammad Zubair, Rav...